Impact
Key detail from CVE description: GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. The flaw exists in the processing of ASF stream headers, where user-supplied data is copied into a fixed-length heap buffer without proper length validation (Key detail from vendor commit: The specific flaw exists within the processing of stream headers within ASF files). This results in a heap-based buffer overflow (CWE-120, CWE-122) that allows an attacker to execute arbitrary code in the context of the current process (Key detail from CVE description: An attacker can leverage this vulnerability to execute code). The primary impact is that a malicious actor can gain code execution privileges on any system that uses the vulnerable GStreamer library to process ASF files.
Affected Systems
The affected product is GStreamer, as identified by the CPE cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. Affected vendors and products list only GStreamer (Key detail from known CNA vendors/products). No specific affected version information is provided in the known CNA affected version data (Key detail from known CNA affected version: not available). Therefore, all GStreamer installations that parse ASF files are potentially vulnerable unless mitigated by a patch or runtime restriction.
Risk and Exploitability
Key detail from scoring data: CVSS score 7.8 indicates a high severity, and EPSS score <1% suggests a low current exploitation probability (Key detail from scoring data: EPSS Score: < 1%). The vulnerability is not listed in the CISA KEV catalog (Key detail from scoring data: KEV: not listed). The likely attack vector is remote exploitation via a crafted ASF file delivered over network or local ingestion; this inference is based on the requirement for interaction with the library (Key detail from CVE description). An attacker could supply a malformed ASF header to trigger the heap overflow and gain code execution. Since no official workaround is listed, monitoring input traffic and applying a patch are the primary defensive measures.
OpenCVE Enrichment
Debian DLA
Debian DSA