Gentoo Logo

GStreamer FFmpeg plugin: Heap-based buffer overflow


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200602-01 / gst-plugins-ffmpeg
Release Date February 05, 2006
Latest Revision February 05, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-plugins/gst-plugins-ffmpeg < 0.8.7-r1 >= 0.8.7-r1 All supported architectures

Related bugreports: #119512


The GStreamer FFmpeg plugin is vulnerable to a buffer overflow that may be exploited by attackers to execute arbitrary code.

2.  Impact Information


The GStreamer FFmpeg plugin uses code from the FFmpeg library to provide fast colorspace conversion and multimedia decoders to the GStreamer open source media framework.


The GStreamer FFmpeg plugin contains derived code from the FFmpeg library, which is vulnerable to a heap overflow in the "avcodec_default_get_buffer()" function discovered by Simon Kilvington (see GLSA 200601-06).


A remote attacker could entice a user to run an application using the GStreamer FFmpeg plugin on a maliciously crafted PIX_FMT_PAL8 format image file (like PNG images), possibly leading to the execution of arbitrary code with the permissions of the user running the application.

3.  Resolution Information


There is no known workaround at this time.


All GStreamer FFmpeg plugin users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-ffmpeg-0.8.7-r1"

4.  References


Page updated February 05, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.