Common Vulnerabilities and Exposures assigned an identifier CVE-2009-0387 to the following vulnerability: Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted Sync Sample (aka stss) atom data in a malformed QuickTime media .mov file, related to "mark keyframes." References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387 http://www.securityfocus.com/archive/1/archive/1/500317/100/0/threaded http://www.openwall.com/lists/oss-security/2009/01/29/3 http://trapkit.de/advisories/TKADV2009-003.txt http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53 http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html http://www.securityfocus.com/bid/33405 http://www.frsirt.com/english/advisories/2009/0225 http://secunia.com/advisories/33650
gstreamer-plugins-good-0.10.8-10.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
gstreamer-plugins-good-0.10.13-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2009-0271.html Fedora: https://admin.fedoraproject.org/updates/F10/FEDORA-2009-1213 https://admin.fedoraproject.org/updates/F9/FEDORA-2009-1343