CVE-2024-47538

GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*

History

19 Dec 2024, 22:15

Type Values Removed Values Added
Summary (en) GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10. (en) GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.

18 Dec 2024, 21:51

Type Values Removed Values Added
Summary
  • (es) GStreamer es una librería para construir gráficos de componentes de manejo de medios. Se ha detectado un desbordamiento del búfer de pila en la función vorbis_handle_identification_packet dentro de gstvorbisdec.c. La matriz de posición es un búfer asignado a la pila de tamaño 64. Si vd->vi.channels supera los 64, el bucle for escribirá más allá de los límites de la matriz de posición. El valor escrito siempre será GST_AUDIO_CHANNEL_POSITION_NONE. Esta vulnerabilidad permite sobrescribir la dirección EIP asignada en la pila. Además, este error puede sobrescribir la estructura de información GstAudioInfo. Esta vulnerabilidad se corrigió en 1.24.10.
First Time Gstreamer Project gstreamer
Gstreamer Project
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
CWE CWE-787
References () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch - () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch - Patch
References () https://gstreamer.freedesktop.org/security/sa-2024-0022.html - () https://gstreamer.freedesktop.org/security/sa-2024-0022.html - Release Notes
References () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - Third Party Advisory

12 Dec 2024, 02:03

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:03

Updated : 2024-12-19 22:15


NVD link : CVE-2024-47538

Mitre link : CVE-2024-47538

CVE.ORG link : CVE-2024-47538


JSON object : View

Products Affected

gstreamer_project

  • gstreamer
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write