Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-44446— GStreamer MXF File Parsing Use-After-Free Remote Code Execution Vulnerability

EPSS 3.50% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-44446

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GStreamer MXF File Parsing Use-After-Free Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
GStreamer MXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of MXF video files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22299.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
GStreamer 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GStreamer是一套用于处理流媒体的框架。 GStreamer 存在安全漏洞,该漏洞源于媒体框架及其编解码器和解复用器的插件存在问题,如果打开格式错误的媒体文件,可能会导致拒绝服务或执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
GStreamerGStreamer 64a58c37acc564285a125f99570787fb678446c9 -

II. Public POCs for CVE-2023-44446

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-44446

登录查看更多情报信息。

Same Patch Batch · GStreamer · 2024-05-03 · 11 CVEs total

CVE-2023-38104GStreamer RealMedia File Parsing Integer Overflow Remote Code Execution Vulnerability
CVE-2023-38103GStreamer RealMedia File Parsing Integer Overflow Remote Code Execution Vulnerability
CVE-2023-37327GStreamer FLAC File Parsing Integer Overflow Remote Code Execution Vulnerability
CVE-2023-37328GStreamer PGS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-37329GStreamer SRT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-44429GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-40476GStreamer H265 Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-40474GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vulnerability
CVE-2023-40475GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vulnerability
CVE-2023-50186GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerabilit

IV. Related Vulnerabilities

V. Comments for CVE-2023-44446

No comments yet


Leave a comment