Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47615

Опубликовано: 11 дек. 2024
Источник: redhat
CVSS3: 9.8

Описание

GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad->vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad->vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.

A flaw was found in the GStreamer library. An out-of-bounds write in the Ogg demuxer can cause crashes for certain input files. This vulnerability allows a malicious third party to trigger out-of-bounds writes that can result in the application's crash or possibly allow code execution through heap manipulation.

Отчет

This vulnerability should be classified as important severity rather than moderate due to its potential impact on memory integrity and application stability. The out-of-bounds write (OOB-Write) in the gst_parse_vorbis_setup_packet function overwrites up to 380 bytes of memory beyond the boundaries of the vorbis_mode_sizes array, directly corrupting adjacent memory structures. Such corruption could lead to uncontrolled behavior, including crashes, denial of service, or even arbitrary code execution if an attacker crafts malicious input to exploit the overwritten memory. The absence of proper bounds validation makes the vulnerability exploitable with untrusted input, elevating the risk in scenarios where GStreamer is used to process external or user-supplied media files.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gstreamer1-plugins-baseAffected
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-baseFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportgstreamer1-plugins-goodFixedRHSA-2024:1134418.12.2024
Red Hat Enterprise Linux 8gstreamer1-plugins-baseFixedRHSA-2024:1134518.12.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1113016.12.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicegstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionsgstreamer1-plugins-baseFixedRHSA-2024:1114316.12.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportgstreamer1-plugins-baseFixedRHSA-2024:1114116.12.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicegstreamer1-plugins-baseFixedRHSA-2024:1114116.12.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2331740gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad->vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad->vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
nvd
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad->vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad->vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.

CVSS3: 9.8
debian
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 9.8
fstec
9 месяцев назад

Уязвимость функции gst_parse_vorbis_setup_packet мультимедийного фреймворка Gstreamer, позволяющая нарушителю вызвать отказ в обслуживании

rocky
6 месяцев назад

Important: gstreamer1-plugins-base security update

9.8 Critical

CVSS3