Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47607

Опубликовано: 11 дек. 2024
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. stack-buffer overflow has been detected in the gst_opus_dec_parse_header function within `gstopusdec.c'. The pos array is a stack-allocated buffer of size 64. If n_channels exceeds 64, the for loop will write beyond the boundaries of the pos array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This bug allows to overwrite the EIP address allocated in the stack. This vulnerability is fixed in 1.24.10.

A flaw was found in the GStreamer library. A stack buffer overflow in the Opus decoder can cause crashes for certain input files, potentially allowing a malicious third party to trigger an application crash.

Отчет

This vulnerability in gst_opus_dec_parse_header is of important severity because it allows an attacker to trigger a stack-based buffer overflow by exceeding the pos array's bounds with unvalidated n_channels input. Since the pos array is stack-allocated, writing beyond its boundaries can overwrite critical memory regions, including the return address or control data, potentially leading to arbitrary code execution or complete compromise of the affected system. Moreover, the written value, GST_AUDIO_CHANNEL_POSITION_NONE, being predictable, may aid attackers in crafting reliable exploits.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gstreamer1-plugins-baseAffected
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-baseFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-goodFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 8gstreamer1-plugins-baseFixedRHSA-2024:1134518.12.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1113016.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicegstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionsgstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1114116.12.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicegstreamer1-plugins-baseFixedRHSA-2024:1114116.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2331754gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header

EPSS

Процентиль: 33%
0.00127
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. stack-buffer overflow has been detected in the gst_opus_dec_parse_header function within `gstopusdec.c'. The pos array is a stack-allocated buffer of size 64. If n_channels exceeds 64, the for loop will write beyond the boundaries of the pos array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This bug allows to overwrite the EIP address allocated in the stack. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
nvd
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. stack-buffer overflow has been detected in the gst_opus_dec_parse_header function within `gstopusdec.c'. The pos array is a stack-allocated buffer of size 64. If n_channels exceeds 64, the for loop will write beyond the boundaries of the pos array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This bug allows to overwrite the EIP address allocated in the stack. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
debian
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 9.8
fstec
9 месяцев назад

Уязвимость функции gst_opus_dec_parse_header мультимедийного фреймворка Gstreamer, позволяющая нарушителю вызвать отказ в обслуживании

rocky
6 месяцев назад

Important: gstreamer1-plugins-base security update

EPSS

Процентиль: 33%
0.00127
Низкий

9.8 Critical

CVSS3