CVE-2024-47537

CRITICAL
2024-12-12 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 17, 2026 - 20:45 vuln.today
Patch Released
Mar 17, 2026 - 20:45 nvd
Patch available
CVE Published
Dec 12, 2024 - 02:03 nvd
CRITICAL 9.8

Description

GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream->samples to accommodate stream->n_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.

Analysis

An integer overflow vulnerability in GStreamer's QuickTime demuxer leads to out-of-bounds memory writes when processing malicious media files with crafted sample count values. The vulnerability affects all GStreamer versions prior to 1.24.10 and allows remote attackers to achieve arbitrary code execution without authentication by serving specially crafted media files. With a critical CVSS score of 9.8 and network-based attack vector, this presents a severe risk for applications using GStreamer for media processing.

Technical Context

GStreamer is a widely-used multimedia framework library for constructing graphs of media-handling components, identified by CPE cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. The vulnerability stems from CWE-190 (Integer Overflow or Wraparound) in the QuickTime demuxer component where the program attempts to reallocate memory for stream->samples based on untrusted input. When processing QuickTime files, the demuxer reads a samples_count value directly from the input file and adds it to stream->n_samples without proper bounds checking. If samples_count is sufficiently large, the addition operation overflows, causing g_try_renew to allocate far less memory than required. The subsequent loop then writes samples_count elements to this undersized buffer, resulting in heap corruption.

Affected Products

All versions of GStreamer prior to 1.24.10 are vulnerable to this integer overflow issue, as identified by CPE cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. The vulnerability specifically affects the QuickTime demuxer component within GStreamer's good plugins collection. GStreamer has published an official security advisory at https://gstreamer.freedesktop.org/security/sa-2024-0005.html detailing the issue. Debian has also issued security updates for their Long Term Support releases as noted in https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html, indicating the broad impact across Linux distributions that package GStreamer.

Remediation

Upgrade GStreamer to version 1.24.10 or later which contains the fix for this vulnerability. The patch is available at https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch and has been incorporated into the 1.24.10 release. For systems that cannot immediately upgrade, consider implementing input validation or sandboxing for any services that process untrusted media files with GStreamer. Organizations should review the vendor security advisory at https://gstreamer.freedesktop.org/security/sa-2024-0005.html for additional details and ensure all GStreamer installations across their infrastructure are updated, particularly those exposed to untrusted input.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: 0

Share

CVE-2024-47537 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy