CVE-2024-47607Stack-based Buffer Overflow in Gstreamer

Severity
8.6HIGHNVD
OSV8.8
EPSS
0.1%
top 71.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12
Latest updateOct 7

Description

GStreamer is a library for constructing graphs of media-handling components. stack-buffer overflow has been detected in the gst_opus_dec_parse_header function within `gstopusdec.c'. The pos array is a stack-allocated buffer of size 64. If n_channels exceeds 64, the for loop will write beyond the boundaries of the pos array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This bug allows to overwrite the EIP address allocated in the stack. This vulnerability is fixed in 1.24.10.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDgstreamer/gstreamer< 1.24.10
debiandebian/gst-plugins-base1.0< gst-plugins-base1.0 1.22.0-3+deb12u3 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
gst-plugins-base1.0 vulnerabilities2025-10-07
OSV
CVE-2024-47607: GStreamer is a library for constructing graphs of media-handling components2024-12-12

📋Vendor Advisories

4
Ubuntu
GStreamer Base Plugins vulnerabilities2025-10-07
Ubuntu
GStreamer Base Plugins vulnerabilities2024-12-18
Red Hat
gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header2024-12-11
Debian
CVE-2024-47607: gst-plugins-base1.0 - GStreamer is a library for constructing graphs of media-handling components. st...2024