{"id":"UBUNTU-CVE-2023-40474","details":"GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of MXF video files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-21660.","modified":"2026-04-22T14:11:13.687275Z","published":"2023-09-28T00:00:00Z","related":["USN-6526-1"],"upstream":["CVE-2023-40474"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-40474"},{"type":"REPORT","url":"https://gstreamer.freedesktop.org/security/sa-2023-0006.html"},{"type":"REPORT","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1456/"},{"type":"REPORT","url":"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5362"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6526-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-40474"}],"affected":[{"package":{"name":"gst-plugins-bad0.10","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-bad0.10@0.10.23-7.2ubuntu1.3+esm1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.10.23-7ubuntu2","0.10.23-7.2ubuntu1","0.10.23-7.2ubuntu1.1","0.10.23-7.2ubuntu1.2","0.10.23-7.2ubuntu1.3","0.10.23-7.2ubuntu1.3+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"gstreamer0.10-plugins-bad","binary_version":"0.10.23-7.2ubuntu1.3+esm1"},{"binary_name":"libgstreamer-plugins-bad0.10-0","binary_version":"0.10.23-7.2ubuntu1.3+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40474.json"}},{"package":{"name":"gst-plugins-bad1.0","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-bad1.0@1.2.4-1~ubuntu1.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2.0-3ubuntu5","1.2.1-1ubuntu1","1.2.1-1ubuntu2","1.2.2-1ubuntu1","1.2.2-1ubuntu2","1.2.2-1ubuntu4","1.2.3-1ubuntu1","1.2.3-1ubuntu2","1.2.4-1~ubuntu1","1.2.4-1~ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"gstreamer1.0-hybris","binary_version":"1.2.4-1~ubuntu1.1"},{"binary_name":"gstreamer1.0-plugins-bad","binary_version":"1.2.4-1~ubuntu1.1"},{"binary_name":"gstreamer1.0-plugins-bad-faad","binary_version":"1.2.4-1~ubuntu1.1"},{"binary_name":"gstreamer1.0-plugins-bad-videoparsers","binary_version":"1.2.4-1~ubuntu1.1"},{"binary_name":"libgstreamer-plugins-bad1.0-0","binary_version":"1.2.4-1~ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40474.json"}},{"package":{"name":"gst-plugins-bad1.0","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-bad1.0@1.8.3-1ubuntu0.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.6.0-1ubuntu1","1.6.1-1ubuntu1","1.6.2-1ubuntu1","1.7.1-1ubuntu1","1.7.1-1ubuntu3","1.7.1-1ubuntu4","1.7.2-1ubuntu1","1.7.90-1ubuntu2","1.7.91-1ubuntu1","1.8.0-1ubuntu1","1.8.1-1ubuntu0.1","1.8.2-1ubuntu0.1","1.8.2-1ubuntu0.2","1.8.3-1ubuntu0.2"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-gst-plugins-bad-1.0","binary_version":"1.8.3-1ubuntu0.2"},{"binary_name":"gstreamer1.0-hybris","binary_version":"1.8.3-1ubuntu0.2"},{"binary_name":"gstreamer1.0-plugins-bad","binary_version":"1.8.3-1ubuntu0.2"},{"binary_name":"gstreamer1.0-plugins-bad-faad","binary_version":"1.8.3-1ubuntu0.2"},{"binary_name":"gstreamer1.0-plugins-bad-videoparsers","binary_version":"1.8.3-1ubuntu0.2"},{"binary_name":"libgstreamer-plugins-bad1.0-0","binary_version":"1.8.3-1ubuntu0.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40474.json"}},{"package":{"name":"gst-plugins-bad1.0","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-bad1.0@1.14.5-0ubuntu1~18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.12.3-1ubuntu1","1.12.3-1ubuntu2","1.12.3-2ubuntu1","1.12.4-2ubuntu1","1.12.4-2ubuntu2","1.13.1-1ubuntu1","1.13.91-1ubuntu1","1.14.0-1ubuntu1","1.14.1-1ubuntu1~ubuntu18.04.1","1.14.4-1ubuntu1~ubuntu18.04.1","1.14.5-0ubuntu1~18.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-gst-plugins-bad-1.0","binary_version":"1.14.5-0ubuntu1~18.04.1"},{"binary_name":"gstreamer1.0-opencv","binary_version":"1.14.5-0ubuntu1~18.04.1"},{"binary_name":"gstreamer1.0-plugins-bad","binary_version":"1.14.5-0ubuntu1~18.04.1"},{"binary_name":"libgstreamer-opencv1.0-0","binary_version":"1.14.5-0ubuntu1~18.04.1"},{"binary_name":"libgstreamer-plugins-bad1.0-0","binary_version":"1.14.5-0ubuntu1~18.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40474.json"}},{"package":{"name":"gst-plugins-bad1.0","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-bad1.0@1.16.3-0ubuntu1.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.16.3-0ubuntu1.1"}]}],"versions":["1.16.1-1ubuntu1","1.16.1-1ubuntu3","1.16.1-1ubuntu4","1.16.1-1ubuntu5","1.16.1-1ubuntu6","1.16.1-1ubuntu8","1.16.2-1ubuntu1","1.16.2-1ubuntu2","1.16.2-2ubuntu1","1.16.2-2.1ubuntu1","1.16.3-0ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gir1.2-gst-plugins-bad-1.0","binary_version":"1.16.3-0ubuntu1.1"},{"binary_name":"gstreamer1.0-opencv","binary_version":"1.16.3-0ubuntu1.1"},{"binary_name":"gstreamer1.0-plugins-bad","binary_version":"1.16.3-0ubuntu1.1"},{"binary_name":"libgstreamer-opencv1.0-0","binary_version":"1.16.3-0ubuntu1.1"},{"binary_name":"libgstreamer-plugins-bad1.0-0","binary_version":"1.16.3-0ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40474.json"}},{"package":{"name":"gst-plugins-bad1.0","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/gst-plugins-bad1.0@1.20.3-0ubuntu1.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.20.3-0ubuntu1.1"}]}],"versions":["1.18.5-1ubuntu1","1.18.5-1ubuntu3","1.20.0-2ubuntu2","1.20.1-1ubuntu2","1.20.3-0ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gir1.2-gst-plugins-bad-1.0","binary_version":"1.20.3-0ubuntu1.1"},{"binary_name":"gstreamer1.0-opencv","binary_version":"1.20.3-0ubuntu1.1"},{"binary_name":"gstreamer1.0-plugins-bad","binary_version":"1.20.3-0ubuntu1.1"},{"binary_name":"gstreamer1.0-plugins-bad-apps","binary_version":"1.20.3-0ubuntu1.1"},{"binary_name":"gstreamer1.0-wpe","binary_version":"1.20.3-0ubuntu1.1"},{"binary_name":"libgstreamer-opencv1.0-0","binary_version":"1.20.3-0ubuntu1.1"},{"binary_name":"libgstreamer-plugins-bad1.0-0","binary_version":"1.20.3-0ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40474.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}