CVE Vulnerabilities

CVE-2016-9446

Improper Initialization

Published: Jan 23, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 LOW
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
4.3 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.

Weakness

The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

Affected Software

NameVendorStart VersionEnd Version
GstreamerGstreamer_project*1.11.1 (excluding)
Red Hat Enterprise Linux 7RedHatclutter-gst2-0:2.0.18-1.el7*
Red Hat Enterprise Linux 7RedHatgnome-video-effects-0:0.4.3-1.el7*
Red Hat Enterprise Linux 7RedHatgstreamer1-0:1.10.4-2.el7*
Red Hat Enterprise Linux 7RedHatgstreamer1-plugins-bad-free-0:1.10.4-2.el7*
Red Hat Enterprise Linux 7RedHatgstreamer1-plugins-base-0:1.10.4-1.el7*
Red Hat Enterprise Linux 7RedHatgstreamer1-plugins-good-0:1.10.4-2.el7*
Red Hat Enterprise Linux 7RedHatgstreamer-plugins-bad-free-0:0.10.23-23.el7*
Red Hat Enterprise Linux 7RedHatgstreamer-plugins-good-0:0.10.31-13.el7*
Red Hat Enterprise Linux 7RedHatorc-0:0.4.26-1.el7*
Gst-plugins-bad0.10Ubuntuesm-infra-legacy/trusty*
Gst-plugins-bad0.10Ubuntuprecise*
Gst-plugins-bad0.10Ubuntutrusty*
Gst-plugins-bad0.10Ubuntutrusty/esm*
Gst-plugins-bad1.0Ubuntudevel*
Gst-plugins-bad1.0Ubuntuesm-apps/xenial*
Gst-plugins-bad1.0Ubuntuesm-infra-legacy/trusty*
Gst-plugins-bad1.0Ubuntutrusty*
Gst-plugins-bad1.0Ubuntutrusty/esm*
Gst-plugins-bad1.0Ubuntuupstream*
Gst-plugins-bad1.0Ubuntuvivid/stable-phone-overlay*
Gst-plugins-bad1.0Ubuntuxenial*
Gst-plugins-bad1.0Ubuntuyakkety*
Gst-plugins-bad1.0Ubuntuzesty*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, in Java, if the programmer does not explicitly initialize a variable, then the code could produce a compile-time error (if the variable is local) or automatically initialize the variable to the default value for the variable’s type. In Perl, if explicit initialization is not performed, then a default value of undef is assigned, which is interpreted as 0, false, or an equivalent value depending on the context in which the variable is accessed.

References