FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-10-31 10:54:49 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
37a365ed-1269-11de-a964-0030843d3802gstreamer-plugins-good -- multiple memory overflows

Secunia reports:

Tobias Klein has reported some vulnerabilities in GStreamer Good Plug-ins, which can potentially be exploited by malicious people to compromise a vulnerable system.

A boundary error occurs within the "qtdemux_parse_samples()" function in gst/gtdemux/qtdemux.c when performing QuickTime "ctts" Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.

An array indexing error exists in the "qtdemux_parse_samples()" function in gst/gtdemux/qtdemux.c when performing QuickTime "stss" Atom parsing. This can be exploited to corrupt memory via a specially crafted QuickTime media file.

A boundary error occurs within the "qtdemux_parse_samples()" function in gst/gtdemux/qtdemux.c when performing QuickTime "stts" Atom parsing. This can be exploited to cause a heap-based buffer overflow via a specially crafted QuickTime media file.


Discovery 2009-01-22
Entry 2009-03-16
gstreamer-plugins-good
>= 0.10.9,3 lt 0.10.12,3

CVE-2009-0386
CVE-2009-0387
CVE-2009-0397
http://secunia.com/advisories/33650/
http://trapkit.de/advisories/TKADV2009-003.txt
http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html