Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47540

Опубликовано: 11 дек. 2024
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size < 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem->allocator->mem_unmap_full or mem->allocator->mem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.

A flaw was found in the Matroska/WebM demuxer in the GStreamer library. Processing a specially crafted input file can cause the usage of uninitialized stack memory, allowing calls to uninitialized function pointers, potentially resulting in code execution or an application crash.

Отчет

To exploit this flaw, an attacker needs to trick a user into opening or processing a specially crafted file with the Matroska/WebM demuxer. However, this issue still has an Important severity as it allows an attacker hijack the execution flow of the application, potentially resulting in unexpected behavior, including arbitrary code execution.

Меры по смягчению последствий

Do not process untrusted files with the Matroska/WebM demuxer and monitor application crashes as this may indicate exploitation attempts.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gstreamer1-plugins-goodAffected
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-baseFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-goodFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 8gstreamer1-plugins-goodFixedRHSA-2024:1129917.12.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportgstreamer1-plugins-goodFixedRHSA-2024:1114818.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportgstreamer1-plugins-goodFixedRHSA-2024:1134618.12.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicegstreamer1-plugins-goodFixedRHSA-2024:1134618.12.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionsgstreamer1-plugins-goodFixedRHSA-2024:1134618.12.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportgstreamer1-plugins-goodFixedRHSA-2024:1114918.12.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicegstreamer1-plugins-goodFixedRHSA-2024:1114918.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-457
https://bugzilla.redhat.com/show_bug.cgi?id=2331719gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer

EPSS

Процентиль: 70%
0.00649
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size < 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem->allocator->mem_unmap_full or mem->allocator->mem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
nvd
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size < 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem->allocator->mem_unmap_full or mem->allocator->mem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
debian
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 8.4
fstec
10 месяцев назад

Уязвимость функции gst_matroska_demux_add_wvpk_header мультимедийного фреймворка Gstreamer, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

suse-cvrf
около 2 месяцев назад

Security update for gstreamer-plugins-good

EPSS

Процентиль: 70%
0.00649
Низкий

8.8 High

CVSS3