{"id":"CVE-2016-9634","details":"Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.","modified":"2026-04-16T06:15:59.319243824Z","published":"2017-01-27T22:59:01.943Z","related":["SUSE-SU-2016:3288-1","SUSE-SU-2016:3303-1","SUSE-SU-2017:0210-1","SUSE-SU-2017:0225-1","SUSE-SU-2017:0237-1"],"references":[{"type":"ADVISORY","url":"https://gstreamer.freedesktop.org/releases/1.10/#1.10.2"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2975.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0020.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3723"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/11/24/2"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201705-10"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0019.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3724"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94499"},{"type":"REPORT","url":"https://bugzilla.gnome.org/show_bug.cgi?id=774834"},{"type":"EVIDENCE","url":"https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gstreamer/gstreamer","events":[{"introduced":"0"},{"last_affected":"702a4b34480eba2ad168ef7a6e8c31a2d0013a87"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.10.1"}]}}],"versions":["gstreamer-vaapi-0.5.10","gstreamer-vaapi-0.6.0","gstreamer-vaapi-0.7.0","gstreamer-vaapi-1.10.0","gstreamer-vaapi-1.10.1","gstreamer-vaapi-1.6.0","gstreamer-vaapi-1.7.90","gstreamer-vaapi-1.7.91","gstreamer-vaapi-1.8.0","gstreamer-vaapi-1.9.1","gstreamer-vaapi-1.9.2","gstreamer-vaapi-1.9.90"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9634.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}