Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.debian.org/security/2017/dsa-3818 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2017-0021.html | vendor advisory |
http://www.securityfocus.com/bid/95147 | vdb entry third party advisory |
https://bugzilla.gnome.org/show_bug.cgi?id=774896 | issue tracking |
http://rhn.redhat.com/errata/RHSA-2017-0018.html | vendor advisory |
https://gstreamer.freedesktop.org/releases/1.10/#1.10.2 | release notes vendor advisory |
http://www.openwall.com/lists/oss-security/2016/12/05/8 | third party advisory mailing list |
https://security.gentoo.org/glsa/201705-10 | vendor advisory |
http://www.openwall.com/lists/oss-security/2016/12/01/2 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html | mailing list |