PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5838 Gstreamer CVE debrief

CVE-2017-5838 is a memory-safety denial-of-service issue in GStreamer’s datetime parsing code. According to the CVE record, a malformed ISO 8601 datetime string can trigger an out-of-bounds heap read in gst_date_time_new_from_iso8601_string(), affecting GStreamer versions before 1.10.3. The NVD record rates the issue as HIGH severity with network attack vector, no privileges required, and availability impact only.

Vendor
Gstreamer
Product
CVE-2017-5838
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-09
Original CVE updated
2026-05-13
Advisory published
2017-02-09
Advisory updated
2026-05-13

Who should care

Organizations that process untrusted media or metadata with GStreamer, especially systems running versions 1.10.2 or earlier. This is most relevant for services or applications that accept remote content and may parse datetime strings as part of media handling.

Technical summary

The vulnerable function, gst_date_time_new_from_iso8601_string() in gst/gstdatetime.c, can read past heap bounds when given a malformed datetime string. NVD classifies the weakness as CWE-125 (Out-of-bounds Read). The CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, which aligns with a remotely triggerable availability impact rather than code execution.

Defensive priority

High for any deployment that ingests untrusted or externally supplied media/metadata. Priority is especially elevated for internet-facing services and shared platforms that use affected GStreamer releases.

Recommended defensive actions

  • Upgrade GStreamer to 1.10.3 or later, as referenced in the vendor release notes.
  • Inventory applications and services that embed or depend on GStreamer, including transitive dependencies.
  • Treat malformed datetime input as hostile and ensure upstream components reject or sanitize unexpected ISO 8601 strings.
  • If immediate upgrade is not possible, reduce exposure by limiting untrusted content paths that reach GStreamer parsing code.
  • Validate vendor and distro advisories for your platform, including the linked Debian, Red Hat, and Gentoo references, to confirm package-specific fixes.

Evidence notes

The CVE description states that gst_date_time_new_from_iso8601_string() in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service via a malformed datetime string. NVD maps the weakness to CWE-125 and lists the CVSS v3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vendor release notes for 1.10.3 are included in the source references, along with downstream advisories and issue tracking that corroborate the fix timeline.

Official resources

Publicly disclosed in the CVE record on 2017-02-09. NVD later marked the record modified on 2026-05-13; that modification date is not the vulnerability date.