Bug 1724904 (CVE-2019-9928) - CVE-2019-9928 GStreamer: heap-based buffer overflow in the RTSP connection parser via crafted server response leading to remote code execution
Summary: CVE-2019-9928 GStreamer: heap-based buffer overflow in the RTSP connection pa...
Keywords:
Status: ASSIGNED
Alias: CVE-2019-9928
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 1724906 1724907 1724908 1724909 1725230 1725231 1725232 1725234 1725261 1725262 1726420 1726421 1726422 1726423
Blocks: 1724910
TreeView+ depends on / blocked
 
Reported: 2019-06-28 04:11 UTC by msiddiqu
Modified: 2023-07-07 08:30 UTC (History)
18 users (show)

Fixed In Version: gst-plugins-base 1.16.0
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description msiddiqu 2019-06-28 04:11:48 UTC
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.

References:   

https://gstreamer.freedesktop.org/security/sa-2019-0001.html

Upstream MR:

https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/merge_requests/157

Comment 2 Marco Benatto 2019-06-28 21:42:27 UTC
External References:

https://gstreamer.freedesktop.org/security/sa-2019-0001.html

Comment 3 Marco Benatto 2019-06-28 21:42:43 UTC
Created gstreamer-plugins-base tracking bugs for this issue:

Affects: fedora-all [bug 1725261]


Created mingw-gstreamer1-plugins-base tracking bugs for this issue:

Affects: fedora-all [bug 1725262]

Comment 10 Marco Benatto 2019-07-03 15:06:24 UTC
Statement:

This issue affects the version of gstreamer-plugins-base and gstreamer1-plugins-base as shipped with Red Hat Enterprise Linux 6, 7 and 8. The security impact has been rated as Moderate by the Red Hat Product Security team.

Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Comment 12 Marco Benatto 2019-08-13 12:59:00 UTC
When parsing the session id field from a RTSP connection, gstreamer doesn't proper validate the session id length sent by the server. An attacker could leverage this by crafting a malicious server causing a heap-based overflow on the client, which may DoS or cause memory corruption leading the client-side to behave unexpectedly. The client may mitigate the security risk by avoiding connect to untrusted RTSP servers.


Note You need to log in before you can comment on or make changes to this bug.