Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6663

Опубликовано: 07 июл. 2025
Источник: redhat
CVSS3: 7.8

Описание

GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.

A stack based buffer overflow was found in the GStreamer media handling library. This flaw allows an attacker who is able to feed in a maliciously constructed H266 file to execute arbitrary code in the context of the process running GStreamer.

Отчет

No Red Hat products or offerings are affected by this vulnerability. This vulnerability has been rated as Important rather than Moderate due to its capability to enable remote code execution (RCE) through a stack-based buffer overflow. Unlike typical parsing defects that primarily lead to denial of service, this specific flaw allows an attacker to gain control of the instruction pointer by corrupting stack memory, thereby creating an opportunity for arbitrary code execution. Given GStreamer's widespread use across desktop environments and various media applications, including web browsers, chat clients, and media players, an attacker could exploit this by enticing a user to open or stream a specially crafted malicious video file. The fact that successful exploitation does not require elevated privileges or complex user interaction significantly escalates both its exploitability and potential impact, marking this as a high-severity security concern for end-user systems.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gstreamer1Not affected
Red Hat Enterprise Linux 6gstreamerNot affected
Red Hat Enterprise Linux 7gstreamerNot affected
Red Hat Enterprise Linux 7gstreamer1Not affected
Red Hat Enterprise Linux 8gstreamer1Not affected
Red Hat Enterprise Linux 8mingw-gstreamer1Not affected
Red Hat Enterprise Linux 9gstreamer1Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2376845gstreamer: GStreamer Code Execution Vulnerability

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
27 дней назад

GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.

CVSS3: 7.8
nvd
27 дней назад

GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.

CVSS3: 7.8
debian
27 дней назад

GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code E ...

CVSS3: 7.8
github
27 дней назад

GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.

7.8 High

CVSS3