CVE-2021-3185

A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1917192 Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/202208-31 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:freedesktop:gst-plugins-bad:*:*:*:*:*:*:*:*

History

30 Sep 2022, 12:49

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202208-31 - (GENTOO) https://security.gentoo.org/glsa/202208-31 - Third Party Advisory

15 Aug 2022, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-31 -

25 Apr 2022, 20:16

Type Values Removed Values Added
CWE CWE-120
CWE-121
CWE-787

03 Feb 2021, 21:30

Type Values Removed Values Added
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1917192 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1917192 - Issue Tracking, Patch, Third Party Advisory
CPE cpe:2.3:a:freedesktop:gst-plugins-bad:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8

26 Jan 2021, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-26 18:16

Updated : 2023-12-10 13:41


NVD link : CVE-2021-3185

Mitre link : CVE-2021-3185

CVE.ORG link : CVE-2021-3185


JSON object : View

Products Affected

freedesktop

  • gst-plugins-bad
CWE
CWE-787

Out-of-bounds Write

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')