Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47538

Опубликовано: 11 дек. 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10.

A flaw was found in the Vorbis decoder in the GStreamer library. Processing a specially crafted input file can cause a stack-based buffer overflow in the Vorbis decoder due to improper input validation, resulting in unexpected behavior or, most likely, an application crash.

Отчет

To exploit this flaw, an attacker needs to trick a user into opening or processing a specially crafted .ogg file. However, this issue still has an Important severity as it allows an attacker to trigger a stack-based buffer overflow and overwrite critical memory regions, including the return address of control data, potentially resulting in unexpected behavior, including arbitrary code execution.

Меры по смягчению последствий

Do not process untrusted files with the Vorbis decoder and monitor application crashes as this may indicate exploitation attempts.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gstreamer1-plugins-baseNot affected
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-baseFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-goodFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 8gstreamer1-plugins-baseFixedRHSA-2024:1134518.12.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1113016.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicegstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionsgstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1114116.12.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicegstreamer1-plugins-baseFixedRHSA-2024:1114116.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2331727gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet

EPSS

Процентиль: 33%
0.00127
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
nvd
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
debian
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 9.8
fstec
9 месяцев назад

Уязвимость мультимедийного фреймворка Gstreamer, связанная с переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании

rocky
6 месяцев назад

Important: gstreamer1-plugins-base security update

EPSS

Процентиль: 33%
0.00127
Низкий

8.8 High

CVSS3

Уязвимость CVE-2024-47538