CVE-2019-9928

Publication date 24 April 2019

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.8 · High

Score breakdown

GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.

Status

Package Ubuntu Release Status
gst-plugins-base0.10 19.04 disco Not in release
18.10 cosmic Not in release
18.04 LTS bionic Not in release
16.04 LTS xenial
Fixed 0.10.36-2ubuntu0.2
14.04 LTS trusty Not in release
gst-plugins-base1.0 19.04 disco
Not affected
18.10 cosmic
Fixed 1.14.4-1ubuntu1.1
18.04 LTS bionic
Fixed 1.14.1-1ubuntu1~ubuntu18.04.2
16.04 LTS xenial
Fixed 1.8.3-1ubuntu0.3
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gst-plugins-base1.0

Severity score breakdown

Parameter Value
Base score 8.8 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-3958-1
    • GStreamer Base Plugins vulnerability
    • 29 April 2019

Other references