CVE-2021-3497
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to potentially crash a system or execute malicious code by tricking it into processing specially crafted Matroska files. It occurs when the GStreamer software tries to handle errors in these files, leading to access of memory that has already been freed, which can happen if the software is not updated to the latest version.
Technical Description
GStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing certain malformed Matroska files.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Apr 19, 2021
almost 5 years ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
gstreamer
Product
gstreamer
Related Vulnerabilities
This vulnerability allows an attacker to crash a system or potentially take control of it by exploiting a flaw in the way GStreamer processes certain compressed video files. It requires the attacker to trick the system into handling a specially crafted file, which could lead to serious issues depending on the operating system and its libraries.
This vulnerability allows an attacker to potentially crash a system or execute malicious code by exploiting a flaw in how GStreamer processes certain video files. While the risk of triggering this issue is limited due to size restrictions in one part of the software, the lack of checks in another part means that specially crafted video files could still lead to serious problems.
This vulnerability allows an attacker to potentially crash a system or overwrite memory when processing certain video files, which could lead to further exploitation. The impact depends on the specific system libraries and operating system in use; on some systems, it might just cause a crash, while on others, it could allow an attacker to manipulate memory.
This vulnerability allows an attacker to crash an application or potentially overwrite memory when it processes certain MKV files using bzip compression. The impact depends on the system's configuration; if it uses specific memory management techniques, it may only cause a crash, but in other cases, it could lead to more serious memory corruption issues.
This vulnerability allows an attacker to crash the application or potentially overwrite memory, which could lead to further exploitation, by sending specially crafted MKV files for processing. The impact varies based on the system's memory management; if the system uses certain memory handling techniques, it may only crash, but in other cases, it could allow an attacker to manipulate memory directly.