CVE-2023-37327
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
GStreamer FLAC File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of FLAC audio files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20775.
Analysis
A critical integer overflow vulnerability in GStreamer's FLAC file parsing functionality allows remote attackers to execute arbitrary code when processing malicious FLAC audio files. The vulnerability affects all versions of GStreamer prior to the patched release and requires user interaction (opening/processing a malicious file) to exploit. With an EPSS score of 5.34% (90th percentile), this vulnerability poses a significant real-world risk, though no active exploitation has been reported in KEV.
Technical Context
GStreamer is a widely-used open-source multimedia framework that processes various audio and video formats across multiple platforms. The vulnerability (CWE-190: Integer Overflow or Wraparound) occurs during FLAC audio file parsing when the library fails to properly validate user-supplied data, leading to an integer overflow before buffer allocation. Based on the CPE data (cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*), all versions of GStreamer are affected until patched. This type of vulnerability is particularly dangerous in multimedia libraries as they are commonly used in applications that process untrusted content from the internet or external sources.
Affected Products
All versions of GStreamer multimedia framework are affected by this vulnerability prior to the security update. The vulnerability is tracked under CPE identifiers cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:* indicating all versions are impacted. GStreamer has released official security advisory SA-2023-0001 available at https://gstreamer.freedesktop.org/security/sa-2023-0001.html with detailed patch information. The vulnerability was originally reported through the Zero Day Initiative as ZDI-CAN-20775 and published as ZDI-23-903.
Remediation
Apply the security patches provided in GStreamer security advisory SA-2023-0001 at https://gstreamer.freedesktop.org/security/sa-2023-0001.html immediately. System administrators should update all GStreamer installations to the latest patched version through their distribution's package manager or by downloading directly from the GStreamer project. As a temporary mitigation until patching is complete, restrict processing of FLAC files from untrusted sources and implement input validation for multimedia content in applications using GStreamer. Fedora users should refer to the specific update notice at https://lists.fedoraproject.org/archives/list/[email protected]/message/IGQEFZ6ZB3C2XU4JQD3IAFMQIN456W2D/.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today