6.8
CVSSv2

CVE-2019-9928

Published: 24/04/2019 Updated: 24/08/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

GStreamer prior to 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gstreamer project gstreamer

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 18.10

canonical ubuntu linux 18.04

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #927978 gst-plugins-base10: CVE-2019-9928: Buffer overflow in RTSP parsing Package: src:gst-plugins-base10; Maintainer for src:gst-plugins-base10 is Maintainers of GStreamer packages <gst-plugins-base10@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, ...
GStreamer Base Plugins could be made to crash or run programs if it received specially crafted network traffic ...
It was discovered that a buffer overflow in the RTSP parser of the GStreamer media framework may result in the execution of arbitrary code if a malformed RSTP stream is opened For the stable distribution (stretch), this problem has been fixed in version 1104-1+deb9u1 We recommend that you upgrade your gst-plugins-base10 packages For the detai ...