CVE-2009-0386
Published: 2 February 2009
Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
Priority
Status
Package | Release | Status |
---|---|---|
gst-plugins-bad0.10 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(reached end-of-life)
|
gutsy |
Not vulnerable
(code not present)
|
|
hardy |
Not vulnerable
(code not present)
|
|
intrepid |
Not vulnerable
(code not present)
|
|
jaunty |
Not vulnerable
(code not present)
|
|
karmic |
Not vulnerable
(code not present)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53 (3rd part) |
||
gst-plugins-good0.10 Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(code not present)
|
gutsy |
Released
(0.10.6-0ubuntu4.2)
|
|
hardy |
Released
(0.10.7-3ubuntu0.2)
|
|
intrepid |
Released
(0.10.10.4-1ubuntu1.1)
|
|
jaunty |
Not vulnerable
(0.10.13-2)
|
|
karmic |
Not vulnerable
(0.10.13-2)
|
|
upstream |
Released
(0.10.13-1)
|
|
Patches: upstream: http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53 (3rd part) |