[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1729-1 gst-plugins-bad0.10 -- several vulnerabilities

ID: oval:org.secpod.oval:def:600348Date: (C)2011-05-13   (M)2022-10-10
Class: PATCHFamily: unix




Several vulnerabilities have been found in gst-plugins-bad0.10, a collection of various GStreamer plugins. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0386 Tobias Klein discovered a buffer overflow in the quicktime stream demuxer , which could potentially lead to the execution of arbitrary code via crafted .mov files. CVE-2009-0387 Tobias Klein discovered an array index error in the quicktime stream demuxer , which could potentially lead to the execution of arbitrary code via crafted .mov files. CVE-2009-0397 Tobias Klein discovered a buffer overflow in the quicktime stream demuxer similar to the issue reported in CVE-2009-0386, which could also lead to the execution of arbitrary code via crafted .mov files. For the stable distribution , these problems have been fixed in version 0.10.8-4.1~lenny1 of gst-plugins-good0.10, since the affected plugin has been moved there. The fix was already included in the lenny release. For the oldstable distribution , these problems have been fixed in version 0.10.3-3.1+etch1. For the unstable distribution and the testing distribution , these problems have been fixed in version 0.10.8-4.1 of gst-plugins-good0.10.

Platform:
Debian 4.0
Product:
gst-plugins-bad0.10
Reference:
DSA-1729-1
CVE-2009-0386
CVE-2009-0387
CVE-2009-0397
CVE    3
CVE-2009-0387
CVE-2009-0386
CVE-2009-0397
CPE    1
cpe:/o:debian:debian_linux:4.x

© SecPod Technologies