CVE-2024-47538

GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*

History

19 Dec 2024, 22:15

Type Values Removed Values Added
Summary (en) GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10. (en) GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.

18 Dec 2024, 21:51

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) GStreamer es una librería para construir gráficos de componentes de manejo de medios. Se ha detectado un desbordamiento del búfer de pila en la función vorbis_handle_identification_packet dentro de gstvorbisdec.c. La matriz de posición es un búfer asignado a la pila de tamaño 64. Si vd->vi.channels supera los 64, el bucle for escribirá más allá de los límites de la matriz de posición. El valor escrito siempre será GST_AUDIO_CHANNEL_POSITION_NONE. Esta vulnerabilidad permite sobrescribir la dirección EIP asignada en la pila. Además, este error puede sobrescribir la estructura de información GstAudioInfo. Esta vulnerabilidad se corrigió en 1.24.10.
CPE cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
References () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch - () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch - Patch
References () https://gstreamer.freedesktop.org/security/sa-2024-0022.html - () https://gstreamer.freedesktop.org/security/sa-2024-0022.html - Release Notes
References () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - Third Party Advisory
First Time Gstreamer Project gstreamer
Gstreamer Project

12 Dec 2024, 02:03

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:03

Updated : 2024-12-19 22:15


NVD link : CVE-2024-47538

Mitre link : CVE-2024-47538

CVE.ORG link : CVE-2024-47538


JSON object : View

Products Affected

gstreamer_project

  • gstreamer
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write