Описание
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| gst-plugins-base1.0 | fixed | 1.15.90-1 | experimental | package |
| gst-plugins-base1.0 | fixed | 1.14.4-2 | package | |
| gst-plugins-base0.10 | removed | package |
Примечания
https://gstreamer.freedesktop.org/security/sa-2019-0001.html
https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/merge_requests/157
https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/commit/f672277509705c4034bc92a141eefee4524d15aa (1.15.90)
EPSS
Связанные уязвимости
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
EPSS