CVE Vulnerabilities

CVE-2016-9813

NULL Pointer Dereference

Published: Jan 13, 2017 | Modified: Apr 20, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 LOW
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
4.3 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
GstreamerGstreamer*1.10.1 (including)
Red Hat Enterprise Linux 7RedHatgstreamer1-plugins-bad-free-0:1.4.5-6.el7_3*
Gst-plugins-bad1.0Ubuntuartful*
Gst-plugins-bad1.0Ubuntubionic*
Gst-plugins-bad1.0Ubuntucosmic*
Gst-plugins-bad1.0Ubuntudevel*
Gst-plugins-bad1.0Ubuntudisco*
Gst-plugins-bad1.0Ubuntueoan*
Gst-plugins-bad1.0Ubuntuesm-apps/bionic*
Gst-plugins-bad1.0Ubuntuesm-apps/focal*
Gst-plugins-bad1.0Ubuntuesm-apps/jammy*
Gst-plugins-bad1.0Ubuntuesm-apps/noble*
Gst-plugins-bad1.0Ubuntuesm-apps/xenial*
Gst-plugins-bad1.0Ubuntuesm-infra-legacy/trusty*
Gst-plugins-bad1.0Ubuntufocal*
Gst-plugins-bad1.0Ubuntugroovy*
Gst-plugins-bad1.0Ubuntuhirsute*
Gst-plugins-bad1.0Ubuntuimpish*
Gst-plugins-bad1.0Ubuntujammy*
Gst-plugins-bad1.0Ubuntukinetic*
Gst-plugins-bad1.0Ubuntulunar*
Gst-plugins-bad1.0Ubuntumantic*
Gst-plugins-bad1.0Ubuntunoble*
Gst-plugins-bad1.0Ubuntuoracular*
Gst-plugins-bad1.0Ubuntuplucky*
Gst-plugins-bad1.0Ubuntuquesting*
Gst-plugins-bad1.0Ubuntutrusty*
Gst-plugins-bad1.0Ubuntutrusty/esm*
Gst-plugins-bad1.0Ubuntuupstream*
Gst-plugins-bad1.0Ubuntuvivid/stable-phone-overlay*
Gst-plugins-bad1.0Ubuntuxenial*
Gst-plugins-bad1.0Ubuntuyakkety*
Gst-plugins-bad1.0Ubuntuzesty*

Potential Mitigations

References