4.3
CVSSv2

CVE-2016-9813

Published: 13/01/2017 Updated: 05/01/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The _parse_pat function in the mpegts parser in GStreamer prior to 1.10.2 allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via a crafted file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gstreamer gstreamer

Vendor Advisories

Synopsis Moderate: gstreamer1-plugins-bad-free security update Type/Severity Security Advisory: Moderate Topic An update for gstreamer1-plugins-bad-free is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerabil ...
Hanno Boeck discovered multiple vulnerabilities in the GStreamer media framework and its codecs and demuxers, which may result in denial of service or the execution of arbitrary code if a malformed media file is opened For the stable distribution (jessie), these problems have been fixed in version 144-21+deb8u2 For the upcoming stable distribu ...
A NULL pointer dereference flaw was found in GStreamer's MPEG-TS parser A remote attacker could use this flaw to cause an application using GStreamer to crash ...

Exploits

Source: bugzillagnomeorg/show_bugcgi?id=775120 The attached file will cause a null pointer access and segfault in the mpegts parser Current git code, found with afl ASAN stack trace: ================================================================= ==32545==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fe9571 ...