Impact
This vulnerability is an integer overflow in GStreamer that occurs while processing palette data in AVIfiles formatted with the RIFF container. The flaw is caused by a lack of proper validation of user‑supplied data, allowing an attacker to trigger the overflow and overwrite memory. This attack vector can be leveraged to execute arbitrary code in the context of the current process. The weakness is classified as CWE‑190 and results in remote code execution, giving the attacker the same privileges as the GStreamer consumer application.
Affected Systems
Vendor: GStreamer; Product: GStreamer. Specific version numbers are not listed in the data, so any installation that contains the relevant library components is potentially susceptible. Organizations using GStreamer for media handling should verify whether their deployed version includes the affected palette parsing logic.
Risk and Exploitability
The CVSS score of 7.8 marks this issue as high severity, while an EPSS score of less than 1% indicates a low likelihood of being actively exploited. It is not currently included in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires that the attacker be able to supply a crafted AVI file or similar input that triggers the palette parsing routine. If successful, the attacker achieves full control of the process, potentially leading to system compromise.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN