CVE-2016-9813

MEDIUM

Gstreamer < 1.10.1 - NULL Pointer Dereference

Title source: rule
STIX 2.1

Description

The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Hanno Boeck · textdoslinux
https://www.exploit-db.com/exploits/42162

References (9)

Core 9
Core References
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2017/dsa-3818
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2017-0021.html
Issue Tracking x_refsource_confirm
https://bugzilla.gnome.org/show_bug.cgi?id=775120
Release Notes, Vendor Advisory x_refsource_confirm
https://gstreamer.freedesktop.org/releases/1.10/#1.10.2
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/42162/
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/12/05/8
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/95158
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201705-10
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/12/01/2

Scores

CVSS v3 5.5
EPSS 0.0481
EPSS Percentile 89.5%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-476
Status published
Products (1)
gstreamer/gstreamer < 1.10.1
Published Jan 13, 2017
Tracked Since Feb 18, 2026