CVE-2024-47606

GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem->allocator->mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Apr 2025, 01:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250418-0003/ -

18 Dec 2024, 21:35

Type Values Removed Values Added
References () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch - () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch - Patch
References () https://gstreamer.freedesktop.org/security/sa-2024-0014.html - () https://gstreamer.freedesktop.org/security/sa-2024-0014.html - Release Notes
References () https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/ - () https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/ - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/12/msg00016.html - () https://lists.debian.org/debian-lts-announce/2024/12/msg00016.html - Mailing List
First Time Debian
Gstreamer Project gstreamer
Debian debian Linux
Gstreamer Project
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-191

15 Dec 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/12/msg00016.html -
Summary
  • (es) GStreamer es una librería para construir gráficos de componentes de manejo de medios. Se ha detectado un desbordamiento de enteros en la función qtdemux_parse_theora_extension dentro de qtdemux.c. La vulnerabilidad ocurre debido a un desbordamiento de la variable gint size, que hace que size contenga un valor grande no deseado cuando se convierte en un entero sin signo. Este valor negativo de 32 bits se convierte luego en un entero sin signo de 64 bits (0xfffffffffffffffa) en una llamada posterior a gst_buffer_new_and_alloc. La función gst_buffer_new_allocate luego intenta asignar memoria, llamando finalmente a _sysmem_new_block. La función _sysmem_new_block agrega alineación y tamaño de encabezado al tamaño (sin signo), lo que causa el desbordamiento de la variable 'slice_size'. Como resultado, solo se asignan 0x89 bytes, a pesar del gran tamaño de entrada. Cuando se produce la siguiente llamada a memcpy en gst_buffer_fill, los datos del archivo de entrada sobrescribirán el contenido de la estructura de información GstMapInfo. Por último, durante la llamada a gst_memory_unmap, la memoria sobrescrita puede provocar un secuestro del puntero de función, ya que se llama a la función mem->allocator->mem_unmap_full con un puntero dañado. Esta sobrescritura del puntero de función podría permitir a un atacante alterar el flujo de ejecución del programa, lo que provocaría la ejecución de código arbitrario. Esta vulnerabilidad se corrigió en la versión 1.24.10.

12 Dec 2024, 02:03

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:03

Updated : 2025-04-19 01:15


NVD link : CVE-2024-47606

Mitre link : CVE-2024-47606

CVE.ORG link : CVE-2024-47606


JSON object : View

Products Affected

debian

  • debian_linux

gstreamer_project

  • gstreamer
CWE
CWE-190

Integer Overflow or Wraparound

CWE-191

Integer Underflow (Wrap or Wraparound)