Gentoo Logo

GStreamer FFmpeg plugin: Heap-based buffer overflow

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200602-01 / gst-plugins-ffmpeg
Release Date February 05, 2006
Latest Revision February 05, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-plugins/gst-plugins-ffmpeg < 0.8.7-r1 >= 0.8.7-r1 All supported architectures

Related bugreports: #119512

Synopsis

The GStreamer FFmpeg plugin is vulnerable to a buffer overflow that may be exploited by attackers to execute arbitrary code.

2.  Impact Information

Background

The GStreamer FFmpeg plugin uses code from the FFmpeg library to provide fast colorspace conversion and multimedia decoders to the GStreamer open source media framework.

Description

The GStreamer FFmpeg plugin contains derived code from the FFmpeg library, which is vulnerable to a heap overflow in the "avcodec_default_get_buffer()" function discovered by Simon Kilvington (see GLSA 200601-06).

Impact

A remote attacker could entice a user to run an application using the GStreamer FFmpeg plugin on a maliciously crafted PIX_FMT_PAL8 format image file (like PNG images), possibly leading to the execution of arbitrary code with the permissions of the user running the application.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All GStreamer FFmpeg plugin users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-ffmpeg-0.8.7-r1"

4.  References



Print

Page updated February 05, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.