Описание
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
Отчет
This issue affects the version of gstreamer-plugins-base and gstreamer1-plugins-base as shipped with Red Hat Enterprise Linux 6, 7 and 8. The security impact has been rated as Moderate by the Red Hat Product Security team. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | gstreamer-plugins-base | Out of support scope | ||
| Red Hat Enterprise Linux 6 | gstreamer-plugins-base | Out of support scope | ||
| Red Hat Enterprise Linux 7 | gstreamer1-plugins-base | Will not fix | ||
| Red Hat Enterprise Linux 7 | gstreamer-plugins-base | Will not fix | ||
| Red Hat Enterprise Linux 8 | gstreamer1-plugins-base | Fix deferred |
Показывать по
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP c ...
7.5 High
CVSS3