Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47539

Опубликовано: 11 дек. 2024
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 < ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.

A flaw was found in the GStreamer library. An out-of-bounds write in the MP4/MOV demuxer when handling CEA608 Closed Caption tracks can lead to crashes for certain input files. This vulnerability allows a malicious third party to trigger a crash of the application and perform code execution through heap manipulation.

Отчет

This vulnerability classified as important severity rather than moderate due to its potential for out-of-bounds memory writes, which are highly exploitable in many scenarios. The discrepancy between the memory allocation and loop bounds allows overwriting up to 3 bytes beyond the intended storage array, which could corrupt adjacent memory. Depending on the execution context, this could lead to critical security consequences, such as the alteration of control structures, heap corruption, or stack manipulation, opening paths for arbitrary code execution or escalation of privileges.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gstreamer1-plugins-goodNot affected
Red Hat Enterprise Linux 7gstreamer1-plugins-goodNot affected
Red Hat Enterprise Linux 8gstreamer1-plugins-goodFixedRHSA-2024:1129917.12.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportgstreamer1-plugins-goodFixedRHSA-2024:1114818.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportgstreamer1-plugins-goodFixedRHSA-2024:1134618.12.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicegstreamer1-plugins-goodFixedRHSA-2024:1134618.12.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionsgstreamer1-plugins-goodFixedRHSA-2024:1134618.12.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportgstreamer1-plugins-goodFixedRHSA-2024:1114918.12.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicegstreamer1-plugins-goodFixedRHSA-2024:1114918.12.2024
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutionsgstreamer1-plugins-goodFixedRHSA-2024:1114918.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2331726gstreamer1-plugins-good: OOB-write in convert_to_s334_1a

EPSS

Процентиль: 32%
0.0012
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 < ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
nvd
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 < ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
debian
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 9.8
fstec
9 месяцев назад

Уязвимость функции convert_to_s334_1a мультимедийного фреймворка Gstreamer, позволяющая нарушителю выполнить произвольный код

rocky
6 месяцев назад

Important: gstreamer1-plugins-good security update

EPSS

Процентиль: 32%
0.0012
Низкий

9.8 Critical

CVSS3