GHSL-2024-116: Stack-buffer overflow in gst_opus_dec_parse_header
CVE-2024-47607

8.6HIGH

Key Information:

Vendor

Gstreamer

Status
Vendor
CVE Published:
12 December 2024

What is CVE-2024-47607?

The GStreamer library, designed for creating media-handling component graphs, has a vulnerability in the gst_opus_dec_parse_header function located in gstopusdec.c. The issue arises from a stack-buffer overflow due to the pos array, which is statically allocated with a size of 64. When the number of channels (n_channels) exceeds this size, the for loop writes beyond the buffer's boundaries, consistently writing the value GST_AUDIO_CHANNEL_POSITION_NONE. This write operation can corrupt the EIP address on the stack, potentially leading to unexpected behavior or security exploitation. This vulnerability has been addressed in GStreamer version 1.24.10, and users are advised to update to this version to mitigate potential risks.

Affected Version(s)

gstreamer < 1.24.10

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

.