Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-47774

Опубликовано: 12 дек. 2024
Источник: debian
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gst-plugins-good1.0fixed1.24.10-1package
gst-plugins-good0.10removedpackage

Примечания

  • https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/

  • https://gstreamer.freedesktop.org/security/sa-2024-0028.html

  • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/3890

  • Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/0870e87c7c02e28e22a09a7de0c5b1e5bed68c14

  • Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/98c2175d255bd2459d7645ac6aee50be5cb57fe3 (1.24.10)

EPSS

Процентиль: 32%
0.00119
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.

CVSS3: 5.1
redhat
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.

CVSS3: 9.1
nvd
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.

CVSS3: 9.1
fstec
10 месяцев назад

Уязвимость функции gst_avi_subtitle_parse_gab2_chunk мультимедийного фреймворка Gstreamer, позволяющая нарушителю вызвать отказ в обслуживании

oracle-oval
3 месяца назад

ELSA-2025-7242: gstreamer1-plugins-good security update (MODERATE)

EPSS

Процентиль: 32%
0.00119
Низкий