Описание
GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.
A stack based buffer overflow was found in the GStreamer media handling library. This flaw allows an attacker who is able to feed in a maliciously constructed H266 file to execute arbitrary code in the context of the process running GStreamer.
Отчет
No Red Hat products or offerings are affected by this vulnerability. This vulnerability has been rated as Important rather than Moderate due to its capability to enable remote code execution (RCE) through a stack-based buffer overflow. Unlike typical parsing defects that primarily lead to denial of service, this specific flaw allows an attacker to gain control of the instruction pointer by corrupting stack memory, thereby creating an opportunity for arbitrary code execution. Given GStreamer's widespread use across desktop environments and various media applications, including web browsers, chat clients, and media players, an attacker could exploit this by enticing a user to open or stream a specially crafted malicious video file. The fact that successful exploitation does not require elevated privileges or complex user interaction significantly escalates both its exploitability and potential impact, marking this as a high-severity security concern for end-user systems.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | gstreamer1 | Not affected | ||
Red Hat Enterprise Linux 6 | gstreamer | Not affected | ||
Red Hat Enterprise Linux 7 | gstreamer | Not affected | ||
Red Hat Enterprise Linux 7 | gstreamer1 | Not affected | ||
Red Hat Enterprise Linux 8 | gstreamer1 | Not affected | ||
Red Hat Enterprise Linux 8 | mingw-gstreamer1 | Not affected | ||
Red Hat Enterprise Linux 9 | gstreamer1 | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
7.8 High
CVSS3
Связанные уязвимости
GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.
GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.
GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code E ...
GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.
7.8 High
CVSS3