Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47776

Опубликовано: 11 дек. 2024
Источник: redhat
CVSS3: 5.1
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size < 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.

A flaw was found in the GStreamer library. Various out-of-bounds reads in the WAV parser can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gstreamer1-plugins-goodNot affected
Red Hat Enterprise Linux 7gstreamer1-plugins-goodOut of support scope
Red Hat Enterprise Linux 8gstreamer1-plugins-goodOut of support scope
Red Hat Enterprise Linux 9gstreamer1-plugins-goodFixedRHSA-2025:724213.05.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2331750gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk

EPSS

Процентиль: 53%
0.00299
Низкий

5.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size < 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.

CVSS3: 9.1
nvd
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size < 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.

CVSS3: 9.1
debian
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 9.1
fstec
6 месяцев назад

Уязвимость функции gst_wavparse_cue_chunk мультимедийного фреймворка Gstreamer, позволяющая нарушителю получить доступ к конфиденциальной информации

oracle-oval
около 1 месяца назад

ELSA-2025-7242: gstreamer1-plugins-good security update (MODERATE)

EPSS

Процентиль: 53%
0.00299
Низкий

5.1 Medium

CVSS3

Уязвимость CVE-2024-47776