GStreamer PGS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-37328 
8.8HIGH
What is CVE-2023-37328?
A vulnerability exists in the GStreamer media processing library during the parsing of PGS subtitle files. This flaw is characterized by insufficient validation of user-supplied data length before copying it to a heap-based buffer, leading to a potential buffer overflow condition. As a result, remote attackers can exploit this vulnerability, allowing them to execute arbitrary code within the context of the application using the affected library. The variety of attack vectors depends on how GStreamer is implemented within different applications.
Affected Version(s)
GStreamer 1.22 and latest commit 6dff93acf69c40271a769aa2fa35efbcc2aeb9b4
References
EPSS Score
8% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
 High
Availability:
 High
Attack Vector:
Network
Attack Complexity:
 Low
Privileges Required:
 None
User Interaction:
 Required
Scope:
 Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
