Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1453 [DLA 1770-1] gst-plugins-base1.0 security update 29 April 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gst-plugins-base1.0 Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-9928 Original Bulletin: https://lists.debian.org/debian-lts-announce/2019/04/msg00031.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : gst-plugins-base1.0 Version : 1.4.4-2+deb8u2 CVE ID : CVE-2019-9928 The RTSP connection parser in the base GStreamer packages version 1.0, which is a streaming media framework, was vulnerable against an heap-based buffer overflow by sending a longer than allowed session id in a response and including a semicolon to change the maximum length. This could result in a remote code execution. For Debian 8 "Jessie", this problem has been fixed in version 1.4.4-2+deb8u2. We recommend that you upgrade your gst-plugins-base1.0 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAlzGFaNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEeCdw/+Nx+aCt5sRYHs8y2SfIoynZswiZ/ZXyvZNv1N3z8EB4jomBKfigSgadhF cf8ATfs3TYBb46tpimJMOfDUlyyKHjQwkxz50uElT5ghDLMdPH7y+vft38K+JbBG z5F8KyAk16a/JDv/8sacHOEegsPeOsgjkbwzW9eyZPk+DVQ07ZyR+r8kNEZ//3jZ kIDZ3qCEhR5wiuxfbIULJfn/6btZOmkAZU/Lxp0KJyaU3YVXspWeCTFtLKc0J8Rs MATNdm3wobxMYciuoCIYjo9qGIJfj/C2IES63pcc4VvkYCS2n7jB1dJTwG5jdYE2 72UCleSFc4JTHSDFMxCAvTzUADKAZZJo8LqOWSXZA+Kw4WTg83e+yqTTauvwPIQP 3V8+pyE6gboaSOe3rz6tT8pyn23fHFX/uowAYBESQ+jwAhiuwbT9eecK4OvKERGy Mn6bk8usS6ms4FUdrQodCsW5/43yezLQyh5e6n84VsfC/YyacALZSd3Qp7d2E3Gj JHRRjH4efrWGZE/fn7oqhw5SO2Lxuuyz9KNQA/UNWhw332hBg+/i1hi8HTKAePWa K69o7S2dBQmtmdJZ0C2jPDni9xy434NKPM1nSX1XICXuWEqUF3CmcVxGR7GcFe5t P9LBtO0sLKjbapoYEU7iQV8U2WXjP6gK5qKnUWccTtjXJV5amA4= =pcwS - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXMaCu2aOgq3Tt24GAQhviQ//WmnGEIKzKMv33c2nQH5ffmkPy9n0yixO DsHLsExZQvTfuJtXuexZrjPGEu5wLfsXW5RkGYb/SsmEdaT7T/OVnEUkPlSpAbky ZdLlShuliw1Ut2Xy0JGIPTvrNBKsMi0eozZRroi2g2/VoTes3CJpBKUFxXprSSDO G1b+/ei8lRJxBtk/pQcHKWXFOm3tj3o5LOeFT2JHFgD1iD1A5U+nkcrh9g+sJUcV AdyR/862GmuNHthKA42ai/yWral5cJa9oZJElQSkqAaWMjYAGFtH8d4uzQs4PeVb 4LtGI5N10hb+Y1vcyx1ie47Bdfii1sstHnr9/4dsUenfrX1TvhnOXgtueXVnZqGo 8lfXVa2X5BaimN3xfnFFg0SWa60/ifGxqa3KPPYdtNfOvek9F49ZXijNXoj5UMGf kyXSqOnMw5jixtgWZCffPJx0mPi7J+aATFkhp7yQTJFhHDQEj6baIJC57LNCMP8i f6ftzej+2SCA9ug+WloHTuzXv9GA4ReBBwx3n3KVyBRNQKl7lUf0467M4we44iWz 6Iz3MYZoLaKdwyWX0AWamFDDA1gkKW/e7x7f/69S1yWy4/ymcwHz4aSkfUwN6cTH SlWxvf3LK2WBoRn/QTVn79cxUyB34ytk7XNgzabdOk7sKNrF7vzlgywWgZNuejbi JrRlX0ZXYec= =CHnm -----END PGP SIGNATURE-----