Vulnerability CVE-2009-1932


Published: 2009-06-04   Modified: 2012-02-13

Description:
Multiple integer overflows in the (1) user_info_callback, (2) user_endrow_callback, and (3) gst_pngdec_task functions (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PNG file, which triggers a buffer overflow.

Type:

CWE-189

(Numeric Errors)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Gstreamer -> Good plug-ins 

 References:
http://www.vupen.com/english/advisories/2009/1506
http://www.securityfocus.com/bid/35172
http://www.redhat.com/support/errata/RHSA-2009-1123.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:130
http://www.debian.org/security/2009/dsa-1839
http://security.gentoo.org/glsa/glsa-200907-11.xml
http://secunia.com/advisories/35897
http://secunia.com/advisories/35777
http://secunia.com/advisories/35583
http://secunia.com/advisories/35205
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10798
http://osvdb.org/54827
http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=d9544bcc44adcef769cbdf7f6453e140058a3adc

Copyright 2024, cxsecurity.com

 

Back to Top