FreeBSD : gstreamer-plugins-good -- multiple memory overflows (37a365ed-1269-11de-a964-0030843d3802)

high Nessus Plugin ID 35936

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

Tobias Klein has reported some vulnerabilities in GStreamer Good Plug-ins, which can potentially be exploited by malicious people to compromise a vulnerable system.

A boundary error occurs within the 'qtdemux_parse_samples()' function in gst/gtdemux/qtdemux.c when performing QuickTime 'ctts' Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.

An array indexing error exists in the 'qtdemux_parse_samples()' function in gst/gtdemux/qtdemux.c when performing QuickTime 'stss' Atom parsing. This can be exploited to corrupt memory via a specially crafted QuickTime media file.

A boundary error occurs within the 'qtdemux_parse_samples()' function in gst/gtdemux/qtdemux.c when performing QuickTime 'stts' Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.

Solution

Update the affected package.

See Also

http://trapkit.de/advisories/TKADV2009-003.txt

http://www.nessus.org/u?f6e78973

http://www.nessus.org/u?fd380d4b

Plugin Details

Severity: High

ID: 35936

File Name: freebsd_pkg_37a365ed126911dea9640030843d3802.nasl

Version: 1.16

Type: local

Published: 3/17/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gstreamer-plugins-good, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 3/16/2009

Vulnerability Publication Date: 1/22/2009

Reference Information

CVE: CVE-2009-0386, CVE-2009-0387, CVE-2009-0397

CWE: 119

Secunia: 33650