CVE-2024-47537
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream->samples to accommodate stream->n_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.
Analysis
An integer overflow vulnerability in GStreamer's QuickTime demuxer leads to out-of-bounds memory writes when processing malicious media files with crafted sample count values. The vulnerability affects all GStreamer versions prior to 1.24.10 and allows remote attackers to achieve arbitrary code execution without authentication by serving specially crafted media files. With a critical CVSS score of 9.8 and network-based attack vector, this presents a severe risk for applications using GStreamer for media processing.
Technical Context
GStreamer is a widely-used multimedia framework library for constructing graphs of media-handling components, identified by CPE cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. The vulnerability stems from CWE-190 (Integer Overflow or Wraparound) in the QuickTime demuxer component where the program attempts to reallocate memory for stream->samples based on untrusted input. When processing QuickTime files, the demuxer reads a samples_count value directly from the input file and adds it to stream->n_samples without proper bounds checking. If samples_count is sufficiently large, the addition operation overflows, causing g_try_renew to allocate far less memory than required. The subsequent loop then writes samples_count elements to this undersized buffer, resulting in heap corruption.
Affected Products
All versions of GStreamer prior to 1.24.10 are vulnerable to this integer overflow issue, as identified by CPE cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. The vulnerability specifically affects the QuickTime demuxer component within GStreamer's good plugins collection. GStreamer has published an official security advisory at https://gstreamer.freedesktop.org/security/sa-2024-0005.html detailing the issue. Debian has also issued security updates for their Long Term Support releases as noted in https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html, indicating the broad impact across Linux distributions that package GStreamer.
Remediation
Upgrade GStreamer to version 1.24.10 or later which contains the fix for this vulnerability. The patch is available at https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch and has been incorporated into the 1.24.10 release. For systems that cannot immediately upgrade, consider implementing input validation or sandboxing for any services that process untrusted media files with GStreamer. Organizations should review the vendor security advisory at https://gstreamer.freedesktop.org/security/sa-2024-0005.html for additional details and ensure all GStreamer installations across their infrastructure are updated, particularly those exposed to untrusted input.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today