Impact
The vulnerability is an out‑of‑bounds write in the GStreamer RealMedia demuxer that allows a remote attacker to write past the end of an allocated buffer. This flaw can lead to arbitrary code execution in the context of the current process. The weakness is identified as CWE‑787 and is a classic example of an improper bounds check leading to memory corruption.
Affected Systems
Affected products are GStreamer GStreamer as listed by the CNA. No specific version range is provided in the CNA affected version data, so all installations of GStreamer that include the RealMedia demuxer component may be vulnerable. The common platform enumeration cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:* confirms the breadth of impact across all GStreamer installations.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity. The EPSS score is below 1%, suggesting a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Because the flaw requires interaction with the demuxer to be triggered, the likely attack vector would involve delivery of a crafted RealMedia file to an application that processes such files. An attacker could exploit this remotely if the target application exposes a channel for receiving user‑supplied media content.
OpenCVE Enrichment
Debian DLA
Debian DSA