Vulnerability Details : CVE-2024-47615
GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad->vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad->vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.
Products affected by CVE-2024-47615
- cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*
- cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-47615
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 29 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-47615
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-12-18 |
8.6
|
HIGH | CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/V... |
N/A
|
N/A
|
GitHub, Inc. | 2024-12-11 |
8.6
|
HIGH | CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/V... |
N/A
|
N/A
|
GitHub, Inc. | 2024-12-12 |
CWE ids for CVE-2024-47615
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by:
- a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
- security-advisories@github.com (Primary)
References for CVE-2024-47615
-
https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
GHSL-2024-115_GHSL-2024-118: Multiple vulnerabilities in GStreamer, including stack buffer overflows, out-of-bounds write, and null pointer dereference - CVE-2024-47538, CVE-2024-47607, CVE-2024-47615Third Party Advisory
-
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch
Patch
-
https://gstreamer.freedesktop.org/security/sa-2024-0026.html
GStreamer Security AdvisoryRelease Notes
Jump to