Tobias Klein has reported some vulnerabilities in GStreamer Good
Plug-ins, which can potentially be exploited by malicious people to
compromise a vulnerable system.
A boundary error occurs within the "qtdemux_parse_samples()"
function in gst/gtdemux/qtdemux.c when performing QuickTime "ctts"
Atom parsing. This can be exploited to cause a heap-based buffer
overflow via a specially crafted QuickTime media file.
An array indexing error exists in the "qtdemux_parse_samples()"
function in gst/gtdemux/qtdemux.c when performing QuickTime "stss"
Atom parsing. This can be exploited to corrupt memory via a specially
crafted QuickTime media file.
A boundary error occurs within the "qtdemux_parse_samples()"
function in gst/gtdemux/qtdemux.c when performing QuickTime "stts"
Atom parsing. This can be exploited to cause a heap-based buffer
overflow via a specially crafted QuickTime media file.