CVE-2024-47543Out-of-bounds Read in Gstreamer

CWE-125Out-of-bounds Read5 documents5 sources
Severity
5.1MEDIUMNVD
EPSS
0.1%
top 67.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12
Latest updateDec 18

Description

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDgstreamer/gstreamer< 1.24.10
debiandebian/gst-plugins-good1.0< gst-plugins-good1.0 1.22.0-5+deb12u2 (bookworm)

Patches

🔴Vulnerability Details

1
OSV
CVE-2024-47543: GStreamer is a library for constructing graphs of media-handling components2024-12-12

📋Vendor Advisories

3
Ubuntu
GStreamer Good Plugins vulnerabilities2024-12-18
Red Hat
gstreamer1-plugins-good: OOB-read in qtdemux_parse_container2024-12-11
Debian
CVE-2024-47543: gst-plugins-good1.0 - GStreamer is a library for constructing graphs of media-handling components. An ...2024