CVE Vulnerabilities

CVE-2016-9813

NULL Pointer Dereference

Published: Jan 13, 2017 | Modified: Jan 05, 2018
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 LOW
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
4.3 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
LOW

The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Gstreamer Gstreamer * 1.10.1 (including)
Red Hat Enterprise Linux 7 RedHat gstreamer1-plugins-bad-free-0:1.4.5-6.el7_3 *
Gst-plugins-bad1.0 Ubuntu artful *
Gst-plugins-bad1.0 Ubuntu bionic *
Gst-plugins-bad1.0 Ubuntu cosmic *
Gst-plugins-bad1.0 Ubuntu devel *
Gst-plugins-bad1.0 Ubuntu disco *
Gst-plugins-bad1.0 Ubuntu eoan *
Gst-plugins-bad1.0 Ubuntu esm-apps/xenial *
Gst-plugins-bad1.0 Ubuntu esm-infra-legacy/trusty *
Gst-plugins-bad1.0 Ubuntu focal *
Gst-plugins-bad1.0 Ubuntu groovy *
Gst-plugins-bad1.0 Ubuntu hirsute *
Gst-plugins-bad1.0 Ubuntu impish *
Gst-plugins-bad1.0 Ubuntu jammy *
Gst-plugins-bad1.0 Ubuntu kinetic *
Gst-plugins-bad1.0 Ubuntu lunar *
Gst-plugins-bad1.0 Ubuntu mantic *
Gst-plugins-bad1.0 Ubuntu noble *
Gst-plugins-bad1.0 Ubuntu oracular *
Gst-plugins-bad1.0 Ubuntu trusty *
Gst-plugins-bad1.0 Ubuntu trusty/esm *
Gst-plugins-bad1.0 Ubuntu upstream *
Gst-plugins-bad1.0 Ubuntu vivid/stable-phone-overlay *
Gst-plugins-bad1.0 Ubuntu xenial *
Gst-plugins-bad1.0 Ubuntu yakkety *
Gst-plugins-bad1.0 Ubuntu zesty *

Potential Mitigations

References