Vulnerability Details : CVE-2024-47596
GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.
Vulnerability category: Memory Corruption
Products affected by CVE-2024-47596
- cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*
- cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-47596
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-47596
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | 2024-12-18 |
5.1
|
MEDIUM | CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/V... |
N/A
|
N/A
|
GitHub, Inc. | 2024-12-11 |
5.1
|
MEDIUM | CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/V... |
N/A
|
N/A
|
GitHub, Inc. | 2024-12-12 |
CWE ids for CVE-2024-47596
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by:
- a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
- security-advisories@github.com (Primary)
References for CVE-2024-47596
-
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch
Patch
-
https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/
GHSL-2024-244: OOB-read in FOURCC_SMI_ parsing in GStreamer - CVE-2024-47596 | GitHub Security LabThird Party Advisory
-
https://gstreamer.freedesktop.org/security/sa-2024-0015.html
GStreamer Security AdvisoryRelease Notes
Jump to