untrusted code execution using NES music file play using gstreamer NES CPU emulation CESA-2016-0001
Bug #1641700 reported by
vishnunaini
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
gst-plugins-bad0.10 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
First, I am NOT the person who found the bug. It is a zero day vulnerability(i.e already public).
A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.
The person who found it detailed it here
https:/
Precise and trusty are effected. xenial can be effected if 0.10 is manually installed.
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res