Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53", "name": "http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/33405", "name": "33405", "tags": [], "refsource": "BID"}, {"url": "http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html", "name": "http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html", "tags": ["Patch", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.openwall.com/lists/oss-security/2009/01/29/3", "name": "[oss-security] 20090129 CVE Request -- (sort of urgent) gstreamer-plugins-good (repost) (more details about affected versions -- final version)", "tags": [], "refsource": "MLIST"}, {"url": "http://trapkit.de/advisories/TKADV2009-003.txt", "name": "http://trapkit.de/advisories/TKADV2009-003.txt", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481267", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=481267", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/33650", "name": "33650", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:035", "name": "MDVSA-2009:035", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://www.redhat.com/support/errata/RHSA-2009-0271.html", "name": "RHSA-2009:0271", "tags": [], "refsource": "REDHAT"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html", "name": "SUSE-SR:2009:005", "tags": [], "refsource": "SUSE"}, {"url": "http://secunia.com/advisories/33815", "name": "33815", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/34336", "name": "34336", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/35777", "name": "35777", "tags": [], "refsource": "SECUNIA"}, {"url": "http://security.gentoo.org/glsa/glsa-200907-11.xml", "name": "GLSA-200907-11", "tags": [], "refsource": "GENTOO"}, {"url": "http://www.vupen.com/english/advisories/2009/0225", "name": "ADV-2009-0225", "tags": [], "refsource": "VUPEN"}, {"url": "http://www.ubuntu.com/usn/USN-736-1", "name": "USN-736-1", "tags": [], "refsource": "UBUNTU"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10611", "name": "oval:org.mitre.oval:def:10611", "tags": [], "refsource": "OVAL"}, {"url": "http://www.securityfocus.com/archive/1/500317/100/0/threaded", "name": "20090122 [TKADV2009-003] GStreamer Heap Overflow and Array Index out of Bounds Vulnerabilities", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted Sync Sample (aka stss) atom data in a malformed QuickTime media .mov file, related to \"mark keyframes.\""}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2009-0387", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": true, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2009-02-02T19:30Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:gstreamer:good_plug-ins:0.10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gstreamer:good_plug-ins:0.10.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gstreamer:good_plug-ins:0.10.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:gstreamer:plug-ins:0.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-11T21:01Z"}