漏洞标题
GStreamer AV1Codec解析基于堆的缓冲区溢出远程代码执行漏洞
漏洞描述信息
GStreamer AV1编解码器解析基于堆的缓冲区溢出远程代码执行漏洞。此漏洞允许远程攻击者在受影响的GStreamer安装上执行任意代码。利用此漏洞需要与该库进行交互,但攻击向量可能会根据实现方式而变化。
具体漏洞存在于AV1编码视频文件的解析中。问题在于,在将用户提供的数据复制到固定长度的基于堆的缓冲区之前,缺乏对数据长度的正确验证。攻击者可以利用此漏洞在当前进程的上下文中执行代码。这是一个被标识为ZDI-CAN-22226的漏洞。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞类别
堆缓冲区溢出
漏洞标题
GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
漏洞描述信息
GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the parsing of AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22226.
CVSS信息
N/A
漏洞类别
堆缓冲区溢出
漏洞标题
GStreamer 安全漏洞
漏洞描述信息
GStreamer是一套用于处理流媒体的框架。 GStreamer 1.22.7之前版本存在安全漏洞,该漏洞源于在处理某些格式错误的流时,AV1编解码器解析器中存在基于堆的缓冲区溢出漏洞,攻击者利用此漏洞可以在当前进程的上下文中执行代码。
CVSS信息
N/A
漏洞类别
其他