Ubuntu USN-736-1 (gst-plugins-good0.10)

Published: 2009-03-19 23:52:38
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Technical Details:
It was discovered that GStreamer Good Plugins did not correctly handle malformed Composition Time To Sample (ctts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0386) It was discovered that GStreamer Good Plugins did not correctly handle malformed Sync Sample (aka stss) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0387) It was discovered that GStreamer Good Plugins did not correctly handle malformed Time-to-sample (aka stts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0397)

Summary:
The remote host is missing an update to gst-plugins-good0.10 announced via advisory USN-736-1.

Recommendations:
The problem can be corrected by upgrading your system to the following Linux Distribution Package versions: Ubuntu 7.10: gstreamer0.10-plugins-good 0.10.6-0ubuntu4.2 Ubuntu 8.04 LTS: gstreamer0.10-plugins-good 0.10.7-3ubuntu0.2 Ubuntu 8.10: gstreamer0.10-plugins-good 0.10.10.4-1ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-736-1

Detection Type:
Linux Distribution Package

Solution Type:
Vendor Patch

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2009-0386
https://nvd.nist.gov/vuln/detail/CVE-2009-0387
https://nvd.nist.gov/vuln/detail/CVE-2009-0397
https://nvd.nist.gov/vuln/detail/CVE-2007-5137
https://nvd.nist.gov/vuln/detail/CVE-2007-5378
https://nvd.nist.gov/vuln/detail/CVE-2009-0586
https://nvd.nist.gov/vuln/detail/CVE-2009-0585
https://nvd.nist.gov/vuln/detail/CVE-2009-0135
https://nvd.nist.gov/vuln/detail/CVE-2009-0136
https://nvd.nist.gov/vuln/detail/CVE-2008-4564
https://nvd.nist.gov/vuln/detail/CVE-2009-0538
https://nvd.nist.gov/vuln/detail/CVE-2004-2761

References:

http://www.ubuntu.com/usn/usn-736-1/

Search
Severity
High
CVSS Score
9.3

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.