{"id":"CVE-2016-9813","details":"The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.","modified":"2026-04-01T23:56:08.867214Z","published":"2017-01-13T16:59:01.357Z","related":["MGASA-2018-0012","SUSE-SU-2016:3296-1","SUSE-SU-2016:3297-1"],"references":[{"type":"WEB","url":"https://www.exploit-db.com/exploits/42162/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/05/8"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95158"},{"type":"ADVISORY","url":"https://gstreamer.freedesktop.org/releases/1.10/#1.10.2"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201705-10"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0021.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3818"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/01/2"},{"type":"REPORT","url":"https://bugzilla.gnome.org/show_bug.cgi?id=775120"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gstreamer/gstreamer","events":[{"introduced":"0"},{"last_affected":"702a4b34480eba2ad168ef7a6e8c31a2d0013a87"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.10.1"}]}}],"versions":["1.19.3","1.19.90","1.20.0","1.20.1","1.20.2","1.20.3","1.20.4","1.20.5","1.20.6","1.20.7","1.21.1","1.21.2","1.21.3","1.21.90","1.22.0","1.22.1","1.22.10","1.22.11","1.22.12","1.22.2","1.22.3","1.22.4","1.22.5","1.22.6","1.22.7","1.22.8","1.22.9","1.23.1","1.23.2","1.23.90","1.24.0","1.24.1","1.24.10","1.24.11","1.24.12","1.24.13","1.24.2","1.24.3","1.24.4","1.24.5","1.24.6","1.24.7","1.24.8","1.24.9","1.25.1","1.25.50","1.25.90","1.26.0","1.26.1","1.26.10","1.26.11","1.26.2","1.26.3","1.26.4","1.26.5","1.26.6","1.26.7","1.26.8","1.26.9","1.27.1","1.27.2","1.27.50","1.27.90","1.28.0","1.28.1","1.29.1","gstreamer-vaapi-0.5.10","gstreamer-vaapi-0.6.0","gstreamer-vaapi-0.7.0","gstreamer-vaapi-1.10.0","gstreamer-vaapi-1.10.1","gstreamer-vaapi-1.11.0","gstreamer-vaapi-1.11.1","gstreamer-vaapi-1.11.2","gstreamer-vaapi-1.11.90","gstreamer-vaapi-1.11.91","gstreamer-vaapi-1.12.0","gstreamer-vaapi-1.12.1","gstreamer-vaapi-1.12.2","gstreamer-vaapi-1.12.3","gstreamer-vaapi-1.12.4","gstreamer-vaapi-1.12.5","gstreamer-vaapi-1.13.1","gstreamer-vaapi-1.13.90","gstreamer-vaapi-1.13.91","gstreamer-vaapi-1.14.0","gstreamer-vaapi-1.14.1","gstreamer-vaapi-1.14.2","gstreamer-vaapi-1.14.3","gstreamer-vaapi-1.14.4","gstreamer-vaapi-1.14.5","gstreamer-vaapi-1.15.1","gstreamer-vaapi-1.15.2","gstreamer-vaapi-1.15.90","gstreamer-vaapi-1.16.0","gstreamer-vaapi-1.16.1","gstreamer-vaapi-1.16.2","gstreamer-vaapi-1.16.3","gstreamer-vaapi-1.17.1","gstreamer-vaapi-1.17.2","gstreamer-vaapi-1.17.90","gstreamer-vaapi-1.18.0","gstreamer-vaapi-1.18.1","gstreamer-vaapi-1.18.2","gstreamer-vaapi-1.18.3","gstreamer-vaapi-1.18.4","gstreamer-vaapi-1.18.5","gstreamer-vaapi-1.19.1","gstreamer-vaapi-1.19.2","gstreamer-vaapi-1.6.0","gstreamer-vaapi-1.7.90","gstreamer-vaapi-1.7.91","gstreamer-vaapi-1.8.0","gstreamer-vaapi-1.8.1","gstreamer-vaapi-1.8.2","gstreamer-vaapi-1.8.3","gstreamer-vaapi-1.9.1","gstreamer-vaapi-1.9.2","gstreamer-vaapi-1.9.90","monorepo-start"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9813.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}