Bug 481267 (CVE-2009-0397) - CVE-2009-0397 gstreamer-plugins, gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Time-to-sample (stss) atom data
Summary: CVE-2009-0397 gstreamer-plugins, gstreamer-plugins-good: heap-based buffer ov...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-0397
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://trapkit.de/advisories/TKADV200...
Whiteboard:
Depends On: 483217 483218 483220 483221 833907
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-01-23 10:19 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:28 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2009-02-26 09:16:18 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:0270 0 normal SHIPPED_LIVE Important: gstreamer-plugins security update 2009-02-06 12:50:44 UTC
Red Hat Product Errata RHSA-2009:0271 0 normal SHIPPED_LIVE Important: gstreamer-plugins-good security update 2009-02-06 12:42:09 UTC

Description Jan Lieskovsky 2009-01-23 10:19:33 UTC
Multiple heap-based buffer overflow vulnerabilities and one an array index
out of bounds vulnerability has been reported by Tobias Klein to 
be present in the GStreamer demuxer responsible for demuxing QuickTime
media *.mov files into raw or compressed audio and/or video streams. A remote attacker could use this flaws to execute arbitrary code in the context of an application using the GStreamer multimedia framework.

References:
http://trapkit.de/advisories/TKADV2009-003.txt
http://getsongbird.com/
http://projects.gnome.org/totem/
http://amarok.kde.org/ 
http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53

Proposed solution:
Upgrade to GStreamer gst-plugins-good version >= 0.10.12.

Credit: Tobias Klein

Comment 1 Jan Lieskovsky 2009-01-23 12:04:04 UTC
This issue affects the version of the gstreamer-plugins-good package,
as shipped with Red Hat Enterprise Linux 5.

This issue affects all versions of the gstreamer-plugins-good package,
as shipped with Fedora releases of 9, 10 and devel.

============================================================================

This issue does NOT affect the versions of the gstreamer package, as shipped
with Red Hat Enterprise Linux 3, 4, 5 and Fedora releases of 9, 10 and devel.

This issue does NOT affect the versions of the totem package, as shipped
with Red Hat Enterprise Linux 5 and Fedora releases of 9, 10 and devel.

This issue does NOT affect the versions of the rhythmbox package, as shipped
with Red Hat Enterprise Linux 4, and 5 and Fedora releases of 9, 10 and devel.

This issue does NOT affect the versions of the amarok package, as shipped
with Fedora releases of 9, 10 and devel.

Comment 4 Bastien Nocera 2009-02-02 15:11:53 UTC
(In reply to comment #1)
> This issue affects the version of the gstreamer-plugins-good package,
> as shipped with Red Hat Enterprise Linux 5.
> 
> This issue affects all versions of the gstreamer-plugins-good package,
> as shipped with Fedora releases of 9, 10 and devel.

No it doesn't. It only affects Fedora 9 and Fedora 10. Rawhide already has a new enough version that include those fixes.

Devel:
http://koji.fedoraproject.org/koji/buildinfo?buildID=80255
Fedora 10:
https://admin.fedoraproject.org/updates/gstreamer-plugins-good-0.10.13-1.fc10
Fedora 9:
https://admin.fedoraproject.org/updates/gstreamer-plugins-good-0.10.8-10.fc9

Comment 6 Jan Lieskovsky 2009-02-03 12:49:42 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-0397 to
the following vulnerability:

Heap-based buffer overflow in the qtdemux_parse_samples function in
gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka
gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka
gstreamer-plugins) 0.8.5, might allow remote attackers to execute
arbitrary code via crafted Time-to-sample (aka stts) atom data in a
malformed QuickTime media .mov file.


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397
http://www.securityfocus.com/archive/1/archive/1/500317/100/0/threaded
http://www.openwall.com/lists/oss-security/2009/01/29/3
http://trapkit.de/advisories/TKADV2009-003.txt
http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53
http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html
http://www.securityfocus.com/bid/33405
http://www.frsirt.com/english/advisories/2009/0225
http://secunia.com/advisories/33650

Comment 8 Fedora Update System 2009-02-24 20:41:42 UTC
gstreamer-plugins-good-0.10.8-10.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2009-02-24 20:56:56 UTC
gstreamer-plugins-good-0.10.13-1.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.