GStreamer
open source multimedia framework
Home
Features
News
Annual Conference
Planet (Blogs)
Download
Applications
Security Center
GitLab
Developers
Documentation
Forum
File a Bug
Artwork
@gstreamer on Twitter
@gstreamer on Mastodon
#gstreamer on Matrix

Security Advisory 2019-0001 (CVE-2019-9928)

Summary Buffer overflow in RTSP parsing
Date 2019-04-22 00:30
Affected Versions GStreamer gst-plugins-bad
ID GStreamer-SA-2019-0001
CVE-2019-9928

Details

GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server.

Impact

The potential exists for a malicious server to trigger remote code execution in a connecting client.

Threat mitigation

Exploitation requires the user to access a malicious RTSP server.

Workarounds

The user should refrain from opening RTSP streams from untrusted third parties

Solution

The gst-plugins-base 1.16.0 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile.

References

The GStreamer project

CVE Database Entries

GStreamer 1.16.0 release

Patches


Report a problem on this page.