CVE-2016-9635

NameCVE-2016-9635
DescriptionHeap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-727-1, DSA-3723-1, DSA-3724-1
Debian Bugs845375

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gst-plugins-good1.0 (PTS)buster1.14.4-1+deb10u1fixed
buster (security)1.14.4-1+deb10u3fixed
bullseye (security), bullseye1.18.4-2+deb11u2fixed
bookworm, bookworm (security)1.22.0-5+deb12u1fixed
trixie1.22.10-1fixed
sid1.24.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gst-plugins-good0.10sourcewheezy0.10.31-3+nmu1+deb7u1DLA-727-1
gst-plugins-good0.10sourcejessie0.10.31-3+nmu4+deb8u2DSA-3724-1
gst-plugins-good0.10source(unstable)(unfixed)
gst-plugins-good1.0sourcejessie1.4.4-2+deb8u2DSA-3723-1
gst-plugins-good1.0source(unstable)1.10.1-2845375

Notes

https://scarybeastsecurity.blogspot.ch/2016/11/0day-exploit-advancing-exploitation.html
https://bugzilla.gnome.org/show_bug.cgi?id=774834
Fixed by: https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bf43f44fcfada5ec4a3ce60cb374340486fe9fac
Fixed by: https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=fec77de8cbb0c8192b77aff2e563705ba421f2f2
Fixed by (later followed up): https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=45dcd0b9ccf33ed85cdafeb871a3781f5be57fd9
Fixed by (later followed up): https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=153a8ae752c90d07190ef45803422a4f71ea8bff

Search for package or bug name: Reporting problems