[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE Request (gstreamer-plugins-good)
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2009-06-06 16:25:31
Message-ID: Pine.GSO.4.51.0906061224370.28142 () faron ! mitre ! org
[Download RAW message or body]


The patch link seems to be working again.


======================================================
Name: CVE-2009-1932
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932
Reference: CONFIRM:http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=d9544bcc44adcef769cbdf7f6453e140058a3adc
                
Reference: BID:35172
Reference: URL:http://www.securityfocus.com/bid/35172
Reference: OSVDB:54827
Reference: URL:http://osvdb.org/54827

Multiple integer overflows in the (1) user_info_callback, (2)
user_endrow_callback, and (3) gst_pngdec_task functions
(ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka
gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote
attackers to cause a denial of service and possibly execute arbitrary
code via a crafted PNG file, which triggers a buffer overflow.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic