CVE-2024-47538

CVE Details

Release Date:2024-12-11

Description


GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.

See more information about CVE-2024-47538 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 8.8
Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Unchanged
Confidentiality Impact: High
Integrity Impact: High
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (gstreamer1-plugins-base)ELSA-2024-113442025-01-30
Oracle Linux version 7 (gstreamer1-plugins-good)ELSA-2024-113442025-01-30
Oracle Linux version 8 (gstreamer1-plugins-base)ELSA-2024-113452024-12-19
Oracle Linux version 9 (gstreamer1-plugins-base)ELSA-2024-111232024-12-16


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete