CVE-2024-47777
GHSL-2024-259: GStreamer has an OOB-read in gst_wavparse_smpl_chunk
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework and its codecs and demuxers, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-09-30 CVE Reserved
- 2024-12-11 CVE Published
- 2024-12-12 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch | X_refsource_misc | |
https://gstreamer.freedesktop.org/security/sa-2024-0027.html | X_refsource_misc | |
https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gstreamer Search vendor "Gstreamer" | Gstreamer Search vendor "Gstreamer" for product "Gstreamer" | < 1.24.10 Search vendor "Gstreamer" for product "Gstreamer" and version " < 1.24.10" | en |
Affected
|