Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-47606— GHSL-2024-166: GStreamer Integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes

EPSS 0.72% · P73
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-47606

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GHSL-2024-166: GStreamer Integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes
Source: NVD (National Vulnerability Database)
Vulnerability Description
GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem->allocator->mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
整数溢出或超界折返
Source: NVD (National Vulnerability Database)
Vulnerability Title
GStreamer 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GStreamer是GStreamer开源的一套用于处理流媒体的框架。 GStreamer存在输入验证错误漏洞,该漏洞源于在qtdemux.c中的qtdemux_parse_theora_extension函数中检测到整数下溢。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
gstreamergstreamer < 1.24.10 -

II. Public POCs for CVE-2024-47606

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-47606

登录查看更多情报信息。

Same Patch Batch · gstreamer · 2024-12-11 · 29 CVEs total

CVE-2024-47540GHSL-2024-197: GStreamer uses uninitialized stack memory in Matroska/WebM demuxer
CVE-2024-47776GHSL-2024-260: GStreamer has a OOB-read in gst_wavparse_cue_chunk
CVE-2024-47601GHSL-2024-249: GStreamer has a NULL-pointer dereference in Matroska/WebM demuxer
CVE-2024-47537GHSL-2024-094: GStreamer has an OOB-write in isomp4/qtdemux.c
CVE-2024-47600GHSL-2024-248: GStreamer has an OOB-read in format_channel_mask
CVE-2024-47538GHSL-2024-115: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packe
CVE-2024-47615GHSL-2024-117: GStreamer has an out-of-bounds write in Ogg demuxer
CVE-2024-47834GHSL-2024-280: Gstreamer Use-After-Free read in Matroska CodecPrivate
CVE-2024-47541GHSL-2024-228: GStreamer has an out-of-bounds write in SSA subtitle parser
CVE-2024-47539GHSL-2024-195: GStreamer has an OOB-write in convert_to_s334_1a
CVE-2024-47607GHSL-2024-116: Stack-buffer overflow in gst_opus_dec_parse_header
CVE-2024-47775GHSL-2024-261: GStreamer has an OOB-read in parse_ds64
CVE-2024-47596GHSL-2024-244: GStreamer has an OOB-read in FOURCC_SMI_ parsing
CVE-2024-47835GHSL-2024-263: Gstreamer NULL-pointer dereference in LRC subtitle parser
CVE-2024-47599GHSL-2024-247: GStreamer Insufficient error handling in JPEG decoder that can lead to NULL
CVE-2024-47597GHSL-2024-245: GStreamer has an OOB-read in qtdemux_parse_samples
CVE-2024-47778GHSL-2024-258: GStreamer has an OOB-read in gst_wavparse_adtl_chunk
CVE-2024-47598GHSL-2024-246: GStreamer has an OOB-read in qtdemux_merge_sample_table
CVE-2024-47603GHSL-2024-251: GStreamer NULL-pointer dereference in Matroska/WebM demuxer
CVE-2024-47774GHSL-2024-262: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk

Showing top 20 of 29 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-47606

No comments yet


Leave a comment