PatchSiren cyber security CVE debrief
CVE-2016-9813 Gstreamer CVE debrief
CVE-2016-9813 is a denial-of-service issue in GStreamer’s mpegts parser. According to NVD, the _parse_pat function in GStreamer before 1.10.2 can be crashed by a crafted file, leading to a NULL pointer dereference. The impact is availability-only, and the published CVSS 3.0 vector reflects local execution with required user interaction.
- Vendor
- Gstreamer
- Product
- CVE-2016-9813
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-13
- Advisory updated
- 2026-05-13
Who should care
Administrators and developers who deploy or embed GStreamer, especially applications that process untrusted media files using the mpegts parser. Security teams responsible for desktop, media-processing, or pipeline-based systems should verify whether any installed GStreamer package is older than 1.10.2.
Technical summary
NVD identifies a CWE-476 NULL pointer dereference in the mpegts parser’s _parse_pat function. The affected CPE range is GStreamer versions up to and including 1.10.1. A crafted file can trigger a crash, producing a denial of service rather than code execution or data theft based on the supplied record.
Defensive priority
Medium. The issue is a crash-triggering availability flaw with CVSS 5.5, but it requires local execution and user interaction. Prioritize systems that routinely open untrusted media or that expose GStreamer-based processing to external content.
Recommended defensive actions
- Upgrade GStreamer to 1.10.2 or later, as referenced by the vendor release notes.
- Inventory systems and applications that bundle or dynamically link GStreamer and confirm the installed version is not affected.
- Treat untrusted media files as a risk input and route them through patched builds before processing.
- If immediate upgrading is not possible, restrict handling of untrusted files on exposed systems until remediation is complete.
- Validate vendor and distro advisories for package-specific backports, such as the referenced Red Hat and Debian notices.
Evidence notes
The vulnerability description, affected version range, weakness classification, and CVSS vector come from the supplied NVD record. References include the GStreamer 1.10.2 release notes, GNOME bug tracker entry 775120, and distro advisories from Red Hat and Debian. The record is published on 2017-01-13 and later modified on 2026-05-13; those dates are used only as record timing context.
Official resources
-
CVE-2016-9813 CVE record
CVE.org
-
CVE-2016-9813 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Source reference
[email protected] - Issue Tracking
-
Mitigation or vendor reference
[email protected] - Release Notes, Vendor Advisory
The CVE was published on 2017-01-13, with supporting disclosure references in late 2016 and vendor remediation guidance pointing to GStreamer 1.10.2. Use the published CVE date as the disclosure anchor; do not infer a later issue date from