CVE-2016-9445
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to crash systems using GStreamer by sending specially crafted video files with extremely large dimensions. To exploit this, the attacker needs to deliver a malicious video that the GStreamer software attempts to decode.
Technical Description
Integer overflow in the vmnc decoder in the gstreamer allows remote attackers to cause a denial of service (crash) via large width and height values, which triggers a buffer overflow.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jan 23, 2017
about 9 years ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
gstreamer
Product
gstreamer
Related Vulnerabilities
This vulnerability allows an attacker to crash a system or potentially take control of it by exploiting a flaw in the way GStreamer processes certain compressed video files. It requires the attacker to trick the system into handling a specially crafted file, which could lead to serious issues depending on the operating system and its libraries.
This vulnerability allows an attacker to potentially crash a system or execute malicious code by exploiting a flaw in how GStreamer processes certain video files. While the risk of triggering this issue is limited due to size restrictions in one part of the software, the lack of checks in another part means that specially crafted video files could still lead to serious problems.
This vulnerability allows an attacker to potentially crash a system or overwrite memory when processing certain video files, which could lead to further exploitation. The impact depends on the specific system libraries and operating system in use; on some systems, it might just cause a crash, while on others, it could allow an attacker to manipulate memory.
This vulnerability allows an attacker to crash an application or potentially overwrite memory when it processes certain MKV files using bzip compression. The impact depends on the system's configuration; if it uses specific memory management techniques, it may only cause a crash, but in other cases, it could lead to more serious memory corruption issues.
This vulnerability allows an attacker to crash the application or potentially overwrite memory, which could lead to further exploitation, by sending specially crafted MKV files for processing. The impact varies based on the system's memory management; if the system uses certain memory handling techniques, it may only crash, but in other cases, it could allow an attacker to manipulate memory directly.