
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the GStreamer subparse plugin's parsesubriptime function (CVE-2025-47806). The flaw affects GStreamer through version 1.26.1, where insufficient bounds checking when processing subtitle data can lead to a stack buffer overflow (Red Hat XML).
The vulnerability exists in the gstreamer1-plugins-base package, specifically within the subparse plugin's parsesubriptime function. The issue stems from insufficient bounds checking when processing subtitle data, which can result in a stack buffer overflow. The vulnerability has been assigned a CVSS v3.1 score of 5.6 with vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating moderate severity (Red Hat XML).
When exploited, this vulnerability allows a local attacker to provide a specially crafted subtitle file that can trigger a buffer overflow, potentially resulting in a program crash (Red Hat XML).
Currently, mitigation options are either not available or do not meet Red Hat Product Security criteria for ease of use, deployment, and stability. The fix has been deferred for Red Hat Enterprise Linux versions 7, 8, 9, and 10 (Red Hat XML).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."