GLSA-201705-10 : GStreamer plug-ins: User-assisted execution of arbitrary code

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201705-10
(GStreamer plug-ins: User-assisted execution of arbitrary code)

Multiple vulnerabilities have been discovered in various GStreamer
plug-ins. Please review the CVE identifiers referenced below for details.

Impact :

A remote attacker could entice a user or automated system using a
GStreamer plug-in to process a specially crafted file, resulting in the
execution of arbitrary code or a Denial of Service.

Workaround :

There is no known workaround at this time.

See also :

https://security.gentoo.org/glsa/201705-10

Solution :

All gst-plugins-bad users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=media-libs/gst-plugins-bad-1.10.3:1.0'
All gst-plugins-good users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=media-libs/gst-plugins-good-1.10.3:1.0'
All gst-plugins-base users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=media-libs/gst-plugins-base-1.10.3:1.0'
All gst-plugins-ugly users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=media-libs/gst-plugins-ugly-1.10.3:1.0'

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)