{"id":"CVE-2016-9809","details":"Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.","modified":"2026-05-14T04:00:48.024573516Z","published":"2017-01-13T16:59:01.200Z","related":["SUSE-SU-2016:3296-1","SUSE-SU-2016:3297-1","SUSE-SU-2017:0330-1","SUSE-SU-2017:0331-1"],"database_specific":{},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0018.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0021.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3818"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/01/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/05/8"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95147"},{"type":"ADVISORY","url":"https://gstreamer.freedesktop.org/releases/1.10/#1.10.2"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201705-10"},{"type":"REPORT","url":"https://bugzilla.gnome.org/show_bug.cgi?id=774896"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gstreamer/gstreamer","events":[{"introduced":"0"},{"last_affected":"702a4b34480eba2ad168ef7a6e8c31a2d0013a87"}],"database_specific":{"cpe":"cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.10.1"}]}}],"versions":["gstreamer-vaapi-1.10.1","gstreamer-vaapi-1.10.0","gstreamer-vaapi-1.9.90","gstreamer-vaapi-1.9.2","gstreamer-vaapi-1.9.1","gstreamer-vaapi-1.8.0","gstreamer-vaapi-1.7.91","gstreamer-vaapi-1.7.90","gstreamer-vaapi-1.6.0","gstreamer-vaapi-0.7.0","gstreamer-vaapi-0.6.0","gstreamer-vaapi-0.5.10"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9809.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}