CVE-2024-47538
🟠 Łataj w tym tygodniu
Przepełnienie bufora w GStreamer umożliwia zdalne wykonanie kodu przez nadpisanie adresu EIP na stosie.
CVSS
9.8
EPSS
0.1%
Exploit
none
Vendor
gstreamer
Opis źródłowy (NVD)
GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.
buffer-overflow
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2024-12-12 02:03:28 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-17 15:52:33 UTC |
Referencje
- https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch (security-advisories@github.com) [Patch]
- https://gstreamer.freedesktop.org/security/sa-2024-0022.html (security-advisories@github.com) [Release Notes]
- https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ (security-advisories@github.com) [Third Party Advisory]
- https://lists.debian.org/debian-lts-announce/2024/12/msg00021.html (af854a3a-2127-422b-91ae-364da2661108)