FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

gstreamer-plugins-good -- multiple memory overflows

Affected packages
0.10.9,3 <= gstreamer-plugins-good < 0.10.12,3

Details

VuXML ID 37a365ed-1269-11de-a964-0030843d3802
Discovery 2009-01-22
Entry 2009-03-16

Secunia reports:

Tobias Klein has reported some vulnerabilities in GStreamer Good Plug-ins, which can potentially be exploited by malicious people to compromise a vulnerable system.

A boundary error occurs within the "qtdemux_parse_samples()" function in gst/gtdemux/qtdemux.c when performing QuickTime "ctts" Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.

An array indexing error exists in the "qtdemux_parse_samples()" function in gst/gtdemux/qtdemux.c when performing QuickTime "stss" Atom parsing. This can be exploited to corrupt memory via a specially crafted QuickTime media file.

A boundary error occurs within the "qtdemux_parse_samples()" function in gst/gtdemux/qtdemux.c when performing QuickTime "stts" Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.

References

CVE Name CVE-2009-0386
CVE Name CVE-2009-0387
CVE Name CVE-2009-0397
URL http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html
URL http://secunia.com/advisories/33650/
URL http://trapkit.de/advisories/TKADV2009-003.txt