Логотип exploitDog
bind:"BDU:2024-11328" OR bind:"CVE-2024-47778"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-11328" OR bind:"CVE-2024-47778"

Количество 11

Количество 11

fstec логотип

BDU:2024-11328

9 месяцев назад

Уязвимость функции gst_wavparse_adtl_chunkмультимедийного фреймворка Gstreamer, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2024-47778

6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-47778

6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 5.1
EPSS: Низкий
nvd логотип

CVE-2024-47778

6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-47778

6 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250121-12

5 месяцев назад

Множественные уязвимости gstreamer1-plugins-good

CVSS3: 9.8
EPSS: Низкий
oracle-oval логотип

ELSA-2025-7242

около 1 месяца назад

ELSA-2025-7242: gstreamer1-plugins-good security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0063-1

5 месяцев назад

Security update for gstreamer-plugins-good

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0067-1

5 месяцев назад

Security update for gstreamer-plugins-good

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0064-1

5 месяцев назад

Security update for gstreamer-plugins-good

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0055-1

5 месяцев назад

Security update for gstreamer-plugins-good

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-11328

Уязвимость функции gst_wavparse_adtl_chunkмультимедийного фреймворка Gstreamer, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
9 месяцев назад
ubuntu логотип
CVE-2024-47778

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2024-47778

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 5.1
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2024-47778

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2024-47778

GStreamer is a library for constructing graphs of media-handling compo ...

CVSS3: 7.5
0%
Низкий
6 месяцев назад
redos логотип
ROS-20250121-12

Множественные уязвимости gstreamer1-plugins-good

CVSS3: 9.8
5 месяцев назад
oracle-oval логотип
ELSA-2025-7242

ELSA-2025-7242: gstreamer1-plugins-good security update (MODERATE)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0063-1

Security update for gstreamer-plugins-good

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0067-1

Security update for gstreamer-plugins-good

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0064-1

Security update for gstreamer-plugins-good

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0055-1

Security update for gstreamer-plugins-good

5 месяцев назад

Уязвимостей на страницу