CVE-2025-6663

Published Jul 7, 2025

Last updated 21 days ago

CVSS high 7.8
GStreamer

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-6663 is a vulnerability in GStreamer, specifically within the parsing of H266 SEI messages. The vulnerability is due to the lack of proper validation of the length of user-supplied data before copying it to a fixed-length stack-based buffer. This flaw can be exploited by remote attackers to execute arbitrary code on systems with affected installations of GStreamer. Exploitation requires interaction with the GStreamer library, though attack vectors could vary depending on the implementation.

Description
GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381.
Source
zdi-disclosures@trendmicro.com
NVD status
Analyzed
Products
gstreamer

Risk scores

CVSS 3.0

Type
Secondary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

zdi-disclosures@trendmicro.com
CWE-121
nvd@nist.gov
CWE-787

Social media

Hype score
Not currently trending

Configurations