FKIE_CVE-2016-9447
Vulnerability from fkie_nvd - Published: 2017-01-23 21:59 - Updated: 2026-03-17 15:52
Severity ?
Summary
The ROM mappings in the NSF decoder in gstreamer 0.10.x allow remote attackers to cause a denial of service (out-of-bounds read or write) and possibly execute arbitrary code via a crafted NSF music file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CABCEA7-47FE-4B3B-9556-FB8CDEAD4CDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D4ABB6BA-BC7C-4DEF-8D56-7101EB5F9745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FA03BFEE-ED65-483F-AF60-FCF0B85F6D64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "82EFDF82-DD6F-4825-82D6-3409B000403D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8D81E127-8840-4757-806C-A19DC2C918FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BF2BBF67-A54C-47C4-B81A-67150A159959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE6FFD5F-3EA4-43EF-9CED-BEF6146D5FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "35DFA5A9-9E3B-453D-89F8-EF9F7CBF1A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7B26F0FF-2C0A-42B6-8B2C-FE5899F2EDFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AD083B38-280D-4770-B7F1-335F9A042C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "68D24C7D-CA97-4E5A-B8EB-FA0975935A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0FE9A8-D355-43C6-AA58-07E4146765F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.12:*:*:*:*:*:*:*",
"matchCriteriaId": "44D1AE29-B8BB-4B30-BAE9-621559489B5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "19AAEDF0-7DCF-4875-8353-9A9B22AAA741",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C4B27F-533D-4F8F-8EE7-746E83C283EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.15:*:*:*:*:*:*:*",
"matchCriteriaId": "2D669FB3-F688-4D6C-A4AD-C30A527406A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.16:*:*:*:*:*:*:*",
"matchCriteriaId": "CE725461-3814-4105-8D18-50DA70692816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3251ADA9-8701-466B-8270-4467E87CFDBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6457BE57-BBC8-4C7A-A30E-13C8822DFE0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.19:*:*:*:*:*:*:*",
"matchCriteriaId": "3F9B7A97-AAEF-4ECA-A286-C54D56B26E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "60548FE0-E0ED-40D1-9DC3-629201DAE5BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CA4B6-A26C-4DFE-9B18-8BF36D6F1012",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3FA04B72-5AA3-4114-B793-47A5D9251E49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.23:*:*:*:*:*:*:*",
"matchCriteriaId": "956FBAF1-AD38-40D5-A355-19C7673243AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.24:*:*:*:*:*:*:*",
"matchCriteriaId": "5A822F28-63D0-409C-A7EB-0E292A59F1DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.25:*:*:*:*:*:*:*",
"matchCriteriaId": "58A4B74D-1B65-4868-A34F-16F4AFEB0753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.26:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6D776B-B8E7-407A-83B9-EFFC127B9F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.27:*:*:*:*:*:*:*",
"matchCriteriaId": "6A9A15C0-AAD1-41B3-93B4-54CC020D0144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.28:*:*:*:*:*:*:*",
"matchCriteriaId": "79CA003D-1101-4C2C-8974-7DA03027A4A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.29:*:*:*:*:*:*:*",
"matchCriteriaId": "67635C9C-681C-44B4-A64E-25DB0B585AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.30:*:*:*:*:*:*:*",
"matchCriteriaId": "7252F2D8-134C-48C5-AABF-3737F7536D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.31:*:*:*:*:*:*:*",
"matchCriteriaId": "E190525E-4FBC-4C95-895C-F829FFF49992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.32:*:*:*:*:*:*:*",
"matchCriteriaId": "7A218BF5-C156-4ED0-8936-DC701373BFB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.33:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4232D3-F26F-4598-AA10-71ACD5B47950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.34:*:*:*:*:*:*:*",
"matchCriteriaId": "57BC904F-54E5-4097-8166-A2FE7C9E3854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.35:*:*:*:*:*:*:*",
"matchCriteriaId": "3C26CA87-2EFC-4F5B-8DF6-1B5F33869448",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gstreamer:gstreamer:0.10.36:*:*:*:*:*:*:*",
"matchCriteriaId": "61495A4D-3D75-4C26-8C08-49CC35179E0A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ROM mappings in the NSF decoder in gstreamer 0.10.x allow remote attackers to cause a denial of service (out-of-bounds read or write) and possibly execute arbitrary code via a crafted NSF music file."
},
{
"lang": "es",
"value": "Los mapeos ROM en el decodificador NSF en gstreamer 0.10.x permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura o escritura fuera de l\u00edmites) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo de m\u00fasica NSF manipulado."
}
],
"id": "CVE-2016-9447",
"lastModified": "2026-03-17T15:52:33.870",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-01-23T21:59:03.127",
"references": [
{
"source": "security@opentext.com",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2974.html"
},
{
"source": "security@opentext.com",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0018.html"
},
{
"source": "security@opentext.com",
"url": "http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html"
},
{
"source": "security@opentext.com",
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/12"
},
{
"source": "security@opentext.com",
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/13"
},
{
"source": "security@opentext.com",
"url": "http://www.securityfocus.com/bid/94427"
},
{
"source": "security@opentext.com",
"url": "https://security.gentoo.org/glsa/201705-10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2974.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/94427"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201705-10"
}
],
"sourceIdentifier": "security@opentext.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…