CVE-2024-47539Out-of-bounds Write in Gstreamer

Severity
8.6HIGHNVD
EPSS
0.2%
top 57.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12
Latest updateDec 18

Description

GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 < ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows f

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

CVEListV5gstreamer/gstreamer< 1.24.10
NVDgstreamer/gstreamer< 1.24.10
debiandebian/gst-plugins-good1.0< gst-plugins-good1.0 1.22.0-5+deb12u2 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2024-47539: GStreamer is a library for constructing graphs of media-handling components2024-12-12
CVEList
GHSL-2024-195: GStreamer has an OOB-write in convert_to_s334_1a2024-12-11

📋Vendor Advisories

3
Ubuntu
GStreamer Good Plugins vulnerabilities2024-12-18
Red Hat
gstreamer1-plugins-good: OOB-write in convert_to_s334_1a2024-12-11
Debian
CVE-2024-47539: gst-plugins-good1.0 - GStreamer is a library for constructing graphs of media-handling components. An ...2024