First published: Fri May 17 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
GStreamer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-23896 is classified as a critical vulnerability due to its capability to allow remote code execution.
To fix ZDI-CAN-23896, update GStreamer to the latest version that includes the security patch.
ZDI-CAN-23896 is caused by a flaw in the parsing component of GStreamer that can be exploited by interacting with the library.
Any installations of GStreamer that have not been updated to address this vulnerability are affected by ZDI-CAN-23896.
The implications of ZDI-CAN-23896 include the risk of arbitrary code execution, which can lead to full system compromise.