{"id":"USN-3245-1","summary":"gst-plugins-good0.10, gst-plugins-good1.0 vulnerabilities","details":"Hanno Böck discovered that GStreamer Good Plugins did not correctly handle\ncertain malformed media files. If a user were tricked into opening a\ncrafted media file with a GStreamer application, an attacker could cause a\ndenial of service via application crash.\n","modified":"2026-02-10T04:41:06Z","published":"2017-03-27T17:16:24Z","related":["UBUNTU-CVE-2016-10198","UBUNTU-CVE-2016-10199","UBUNTU-CVE-2017-5840","UBUNTU-CVE-2017-5841","UBUNTU-CVE-2017-5845"],"upstream":["CVE-2016-10198","CVE-2016-10199","CVE-2017-5840","CVE-2017-5841","CVE-2017-5845","UBUNTU-CVE-2016-10198","UBUNTU-CVE-2016-10199","UBUNTU-CVE-2017-5840","UBUNTU-CVE-2017-5841","UBUNTU-CVE-2017-5845"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3245-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10198"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10199"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5840"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5841"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5845"}],"affected":[{"package":{"name":"gst-plugins-good0.10","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-good0.10@0.10.31-3+nmu1ubuntu5.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.10.31-3+nmu1ubuntu5.3"}]}],"versions":["0.10.31-3+nmu1ubuntu3","0.10.31-3+nmu1ubuntu4","0.10.31-3+nmu1ubuntu5","0.10.31-3+nmu1ubuntu5.1","0.10.31-3+nmu1ubuntu5.2"],"ecosystem_specific":{"binaries":[{"binary_name":"gstreamer0.10-gconf","binary_version":"0.10.31-3+nmu1ubuntu5.3"},{"binary_name":"gstreamer0.10-plugins-good","binary_version":"0.10.31-3+nmu1ubuntu5.3"},{"binary_name":"gstreamer0.10-pulseaudio","binary_version":"0.10.31-3+nmu1ubuntu5.3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3245-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-10198"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-10199"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-5840"}]}}},{"package":{"name":"gst-plugins-good1.0","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-good1.0@1.2.4-1~ubuntu1.4?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.4-1~ubuntu1.4"}]}],"versions":["1.2.0-1ubuntu1","1.2.1-1ubuntu1","1.2.1-1ubuntu2","1.2.2-1ubuntu1","1.2.3-1ubuntu1","1.2.3-1ubuntu2","1.2.4-1~ubuntu1","1.2.4-1~ubuntu1.1","1.2.4-1~ubuntu1.3"],"ecosystem_specific":{"binaries":[{"binary_name":"gstreamer1.0-plugins-good","binary_version":"1.2.4-1~ubuntu1.4"},{"binary_name":"gstreamer1.0-pulseaudio","binary_version":"1.2.4-1~ubuntu1.4"},{"binary_name":"libgstreamer-plugins-good1.0-0","binary_version":"1.2.4-1~ubuntu1.4"},{"binary_name":"libgstreamer-plugins-good1.0-dev","binary_version":"1.2.4-1~ubuntu1.4"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3245-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-10198"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-10199"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-5840"}]}}},{"package":{"name":"gst-plugins-good1.0","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-good1.0@1.8.3-1ubuntu0.4?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.3-1ubuntu0.4"}]}],"versions":["1.6.0-1ubuntu1","1.6.1-1ubuntu1","1.6.2-1ubuntu1","1.7.1-1ubuntu1","1.7.2-1ubuntu1","1.7.90-1ubuntu1","1.7.91-1ubuntu1","1.8.0-1ubuntu1","1.8.1-1ubuntu0.1","1.8.2-1ubuntu0.1","1.8.2-1ubuntu0.2","1.8.2-1ubuntu0.3","1.8.3-1ubuntu0.3"],"ecosystem_specific":{"binaries":[{"binary_name":"gstreamer1.0-plugins-good","binary_version":"1.8.3-1ubuntu0.4"},{"binary_name":"gstreamer1.0-pulseaudio","binary_version":"1.8.3-1ubuntu0.4"},{"binary_name":"libgstreamer-plugins-good1.0-0","binary_version":"1.8.3-1ubuntu0.4"},{"binary_name":"libgstreamer-plugins-good1.0-dev","binary_version":"1.8.3-1ubuntu0.4"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3245-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-10198"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-10199"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-5840"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-5841"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-5845"}]}}}],"schema_version":"1.7.3"}