Impact
An out-of-bounds write in GStreamer’s rtpqdm2depay element allows remote attackers to execute arbitrary code. The flaw occurs while parsing X-QDM RTP payload elements, specifically the packetid field, which fails to validate user-supplied data, leading to a write past the end of an allocated array. This enables a malicious actor to execute code in the context of the current process, a direct Remote Code Execution (RCE) impact.
Affected Systems
Vendor: GStreamer, Product: GStreamer library. All releases containing the rtpqdm2depay element prior to the patch are affected; specific version numbers are not disclosed in the CVE record.
Risk and Exploitability
The CVSS score of 8.8 marks the vulnerability as high severity. The EPSS score is below 1%, indicating a low but present likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker can deliver a malicious RTP stream with crafted X-QDM data to trigger the out-of-bounds write; once triggered, the attacker can run arbitrary code with the privileges of the process using GStreamer.
OpenCVE Enrichment
Ubuntu USN