CVE-2024-47776Out-of-bounds Read in Gstreamer

CWE-125Out-of-bounds Read5 documents5 sources
Severity
5.1MEDIUMNVD
EPSS
0.1%
top 70.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 12
Latest updateDec 18

Description

GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size < 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a misc

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDgstreamer/gstreamer< 1.24.10
debiandebian/gst-plugins-good1.0< gst-plugins-good1.0 1.22.0-5+deb12u2 (bookworm)

Patches

🔴Vulnerability Details

1
OSV
CVE-2024-47776: GStreamer is a library for constructing graphs of media-handling components2024-12-12

📋Vendor Advisories

3
Ubuntu
GStreamer Good Plugins vulnerabilities2024-12-18
Red Hat
gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk2024-12-11
Debian
CVE-2024-47776: gst-plugins-good1.0 - GStreamer is a library for constructing graphs of media-handling components. An ...2024
CVE-2024-47776 — Out-of-bounds Read in Gstreamer | cvebase