Vulnerability Details : CVE-2009-1932
Multiple integer overflows in the (1) user_info_callback, (2) user_endrow_callback, and (3) gst_pngdec_task functions (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PNG file, which triggers a buffer overflow.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2009-1932
- cpe:2.3:a:gstreamer:good_plug-ins:0.10.15:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-1932
2.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-1932
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2009-1932
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1932
-
http://www.redhat.com/support/errata/RHSA-2009-1123.html
-
http://security.gentoo.org/glsa/glsa-200907-11.xml
-
http://www.vupen.com/english/advisories/2009/1506
-
http://www.securityfocus.com/bid/35172
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:130
-
http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=d9544bcc44adcef769cbdf7f6453e140058a3adc
Exploit
-
http://www.debian.org/security/2009/dsa-1839
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10798
Jump to