GHSL-2024-116: Stack-buffer overflow in gst_opus_dec_parse_header
CVE-2024-47607

9.8CRITICAL

Key Information:

Vendor

Gstreamer

Status
Vendor
CVE Published:
12 December 2024

What is CVE-2024-47607?

The GStreamer library, designed for creating media-handling component graphs, has a vulnerability in the gst_opus_dec_parse_header function located in gstopusdec.c. The issue arises from a stack-buffer overflow due to the pos array, which is statically allocated with a size of 64. When the number of channels (n_channels) exceeds this size, the for loop writes beyond the buffer's boundaries, consistently writing the value GST_AUDIO_CHANNEL_POSITION_NONE. This write operation can corrupt the EIP address on the stack, potentially leading to unexpected behavior or security exploitation. This vulnerability has been addressed in GStreamer version 1.24.10, and users are advised to update to this version to mitigate potential risks.

Affected Version(s)

gstreamer < 1.24.10

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.