ID CVE-2016-9447
Summary The ROM mappings in the NSF decoder in gstreamer 0.10.x allow remote attackers to cause a denial of service (out-of-bounds read or write) and possibly execute arbitrary code via a crafted NSF music file.
References
Vulnerable Configurations
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.8:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.9:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.10:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.11:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.12:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.13:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.14:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.15:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.15:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.16:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.17:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.18:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.18:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.19:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.19:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.20:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.20:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.21:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.21:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.22:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.22:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.23:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.23:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.24:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.24:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.25:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.25:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.26:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.26:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.27:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.27:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.28:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.28:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.29:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.29:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.30:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.30:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.31:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.31:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.32:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.32:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.33:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.33:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.34:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.34:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.35:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.35:*:*:*:*:*:*:*
  • cpe:2.3:a:gstreamer_project:gstreamer:0.10.36:*:*:*:*:*:*:*
    cpe:2.3:a:gstreamer_project:gstreamer:0.10.36:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 05-01-2018 - 02:31)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • bugzilla
    id 1395767
    title CVE-2016-9445 gstreamer-plugins-bad-free: Integer overflow when allocating render buffer in VMnc decoder
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment gstreamer-plugins-bad-free is earlier than 0:0.10.19-5.el6_8
          oval oval:com.redhat.rhsa:tst:20162974005
        • comment gstreamer-plugins-bad-free is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162974006
      • AND
        • comment gstreamer-plugins-bad-free-devel is earlier than 0:0.10.19-5.el6_8
          oval oval:com.redhat.rhsa:tst:20162974007
        • comment gstreamer-plugins-bad-free-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162974008
      • AND
        • comment gstreamer-plugins-bad-free-devel-docs is earlier than 0:0.10.19-5.el6_8
          oval oval:com.redhat.rhsa:tst:20162974011
        • comment gstreamer-plugins-bad-free-devel-docs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162974012
      • AND
        • comment gstreamer-plugins-bad-free-extras is earlier than 0:0.10.19-5.el6_8
          oval oval:com.redhat.rhsa:tst:20162974009
        • comment gstreamer-plugins-bad-free-extras is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162974010
    rhsa
    id RHSA-2016:2974
    released 2016-12-21
    severity Important
    title RHSA-2016:2974: gstreamer-plugins-bad-free security update (Important)
  • rhsa
    id RHSA-2017:0018
rpms
  • gstreamer-plugins-bad-free-0:0.10.19-5.el6_8
  • gstreamer-plugins-bad-free-devel-0:0.10.19-5.el6_8
  • gstreamer-plugins-bad-free-devel-docs-0:0.10.19-5.el6_8
  • gstreamer-plugins-bad-free-extras-0:0.10.19-5.el6_8
  • gstreamer-plugins-bad-free-0:0.10.23-22.el7_3
  • gstreamer-plugins-bad-free-devel-0:0.10.23-22.el7_3
  • gstreamer-plugins-bad-free-devel-docs-0:0.10.23-22.el7_3
refmap via4
bid 94427
gentoo GLSA-201705-10
misc http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html
mlist
  • [oss-security] 20161118 CVE Request: gstreamer plugins
  • [oss-security] 20161118 Re: CVE Request: gstreamer plugins
Last major update 05-01-2018 - 02:31
Published 23-01-2017 - 21:59
Back to Top