CVE-2016-10199Out-of-bounds Read in Gst-plugins-good1.0

CWE-125Out-of-bounds Read11 documents7 sources
Severity
7.5HIGHNVD
EPSS
3.1%
top 13.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 9
Latest updateMay 14

Description

The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

debiandebian/gst-plugins-good1.0< gst-plugins-good1.0 1.10.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mpgw-wf67-6mwj: The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux2022-05-14
OSV
CVE-2016-10199: The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux2017-02-09

📋Vendor Advisories

3
Ubuntu
GStreamer Good Plugins vulnerabilities2017-03-27
Red Hat
gstreamer-plugins-good: Out of bounds read in qtdemux_tag_add_str_full2016-12-01
Debian
CVE-2016-10199: gst-plugins-good1.0 - The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-goo...2016

💬Community

5
Bugzilla
CVE-2016-10199 CVE-2017-5840 CVE-2017-5841 CVE-2017-5845 gstreamer-plugins-good: various flaws [fedora-all]2017-02-06
Bugzilla
CVE-2016-10199 gstreamer-plugins-good: Out of bounds read in qtdemux_tag_add_str_full2017-02-06
Bugzilla
CVE-2016-10199 CVE-2017-5840 CVE-2017-5841 CVE-2017-5845 gstreamer1-plugins-good: various flaws [fedora-all]2017-02-06
Bugzilla
CVE-2016-10199 CVE-2017-5840 CVE-2017-5841 CVE-2017-5845 mingw-gstreamer-plugins-good: various flaws [fedora-all]2017-02-06
Bugzilla
CVE-2016-10199 CVE-2017-5840 CVE-2017-5841 CVE-2017-5845 mingw-gstreamer1-plugins-good: various flaws [fedora-all]2017-02-06
CVE-2016-10199 — Out-of-bounds Read | cvebase