First published: Thu Sep 28 2023(Updated: )
[Integer overflow in H.265 video parser leading to stack overwrite]
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
GStreamer GStreamer | ||
ubuntu/gst-plugins-bad1.0 | <1.16.3-0ubuntu1.1 | 1.16.3-0ubuntu1.1 |
ubuntu/gst-plugins-bad1.0 | <1.20.3-0ubuntu1.1 | 1.20.3-0ubuntu1.1 |
ubuntu/gst-plugins-bad1.0 | <1.22.1-1ubuntu1.1 | 1.22.1-1ubuntu1.1 |
ubuntu/gst-plugins-bad1.0 | <1.22.4-1ubuntu1.1 | 1.22.4-1ubuntu1.1 |
debian/gst-plugins-bad1.0 | <=1.14.4-1+deb10u2 | 1.14.4-1+deb10u5 1.18.4-3+deb11u4 1.22.0-4+deb12u5 1.22.10-1 1.24.2-3 |
redhat/gstreamer-plugins-bad | <1.22.6 | 1.22.6 |
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/ff91a3d8d6f7e2412c44663bf30fad5c7fdbc9d9
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/fddda166222a067d0e511950a0a8cfb9f5a521b7
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40476 is a vulnerability in GStreamer that allows remote attackers to execute arbitrary code on affected installations.
CVE-2023-40476 has a severity rating of 8.8 (High).
CVE-2023-40476 affects GStreamer versions 1.14.4-1+deb10u5, 1.18.4-3+deb11u3, 1.22.0-4+deb12u3, 1.22.7-1, 1.16.3-0ubuntu1.1, 1.20.3-0ubuntu1.1, 1.22.1-1ubuntu1.1, 1.22.4-1ubuntu1.1.
Exploiting CVE-2023-40476 requires interaction with the GStreamer library, but the specific attack vectors may vary depending on the implementation.
More information about CVE-2023-40476 can be found at the MITRE CVE website, the GStreamer security advisory SA-2023-0008, and the Zero Day Initiative advisory ZDI-23-1458.