CVE-2009-0586

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to run their own malicious code on a system using GStreamer by sending a specially crafted COVERART tag. It requires the attacker to have the ability to provide a manipulated audio file that exploits a flaw in how GStreamer processes certain data.

Technical Description

Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation, which triggers a heap-based buffer overflow.

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 6211 days

Quick Information

Published

Mar 14, 2009

about 17 years ago

Last Modified

Mar 17, 2026

21 days ago

Vendor

gstreamer

Product

gstreamer

Related Vulnerabilities

CVE-2022-2122High

This vulnerability allows an attacker to crash a system or potentially take control of it by exploiting a flaw in the way GStreamer processes certain compressed video files. It requires the attacker to trick the system into handling a specially crafted file, which could lead to serious issues depending on the operating system and its libraries.

CVE-2022-1925High

This vulnerability allows an attacker to potentially crash a system or execute malicious code by exploiting a flaw in how GStreamer processes certain video files. While the risk of triggering this issue is limited due to size restrictions in one part of the software, the lack of checks in another part means that specially crafted video files could still lead to serious problems.

CVE-2022-1924High

This vulnerability allows an attacker to potentially crash a system or overwrite memory when processing certain video files, which could lead to further exploitation. The impact depends on the specific system libraries and operating system in use; on some systems, it might just cause a crash, while on others, it could allow an attacker to manipulate memory.

CVE-2022-1923High

This vulnerability allows an attacker to crash an application or potentially overwrite memory when it processes certain MKV files using bzip compression. The impact depends on the system's configuration; if it uses specific memory management techniques, it may only cause a crash, but in other cases, it could lead to more serious memory corruption issues.

CVE-2022-1922High

This vulnerability allows an attacker to crash the application or potentially overwrite memory, which could lead to further exploitation, by sending specially crafted MKV files for processing. The impact varies based on the system's memory management; if the system uses certain memory handling techniques, it may only crash, but in other cases, it could allow an attacker to manipulate memory directly.