CVE-2017-5841

HIGH
2017-02-09 [email protected]
7.5
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 17, 2026 - 20:45 vuln.today
Patch Released
Mar 17, 2026 - 20:45 nvd
Patch available
CVE Published
Feb 09, 2017 - 15:59 nvd
HIGH 7.5

Description

The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving ncdt tags.

Analysis

An out-of-bounds heap read vulnerability exists in the gst_avi_demux_parse_ncdt function within the GStreamer gst-plugins-good component when parsing malformed AVI files containing crafted ncdt tags. GStreamer versions prior to 1.10.3 are affected, allowing remote attackers to cause denial of service without authentication or user interaction. With an EPSS score of 3.11% (87th percentile), the vulnerability shows moderate real-world exploitation likelihood, and patches are available from the vendor.

Technical Context

GStreamer is a widely-used multimedia framework for constructing graphs of media-handling components, from simple playback to complex audio and video processing. The vulnerability affects cpe:2.3:a:gstreamer:gstreamer versions prior to 1.10.3, specifically within the gst-plugins-good package's AVI demuxer component (gstavidemux.c). The root cause is CWE-125 (Out-of-bounds Read), occurring when the gst_avi_demux_parse_ncdt function improperly validates ncdt (Nikon capture data tags) within AVI container files, allowing reads beyond allocated heap memory boundaries. This type of memory safety issue can lead to information disclosure or application crashes when processing untrusted media files.

Affected Products

GStreamer versions prior to 1.10.3 are affected, specifically installations including the gst-plugins-good package which contains the vulnerable AVI demuxer component. The vulnerability has been confirmed via CPE identifier cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. Multiple Linux distributions have issued advisories including Debian (DSA-3820 at http://www.debian.org/security/2017/dsa-3820), Red Hat (RHSA-2017:2060 at https://access.redhat.com/errata/RHSA-2017:2060), and Gentoo (GLSA-201705-10 at https://security.gentoo.org/glsa/201705-10). The vulnerability is tracked in the upstream bug tracker at https://bugzilla.gnome.org/show_bug.cgi?id=777500.

Remediation

Upgrade GStreamer to version 1.10.3 or later as documented in the official release advisory at https://gstreamer.freedesktop.org/releases/1.10/#1.10.3. Linux distribution users should apply vendor-specific patches through their package managers: Debian users should reference DSA-3820, Red Hat Enterprise Linux users should apply RHSA-2017:2060, and Gentoo users should follow GLSA-201705-10. The patch details are available via the oss-security mailing list at http://www.openwall.com/lists/oss-security/2017/02/02/9. Until patching is feasible, limit exposure by restricting processing of untrusted AVI files, implementing application sandboxing, and blocking network-based media file processing from untrusted sources through content filtering or application whitelisting policies.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +3.1
CVSS: +38
POC: 0

Share

CVE-2017-5841 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy