CVE-2024-47778

HIGH
2024-12-12 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 17, 2026 - 20:45 vuln.today
Patch Released
Mar 17, 2026 - 20:45 nvd
Patch available
CVE Published
Dec 12, 2024 - 02:03 nvd
HIGH 7.5

Description

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

Analysis

An out-of-bounds read vulnerability exists in GStreamer's WAV parser that allows remote attackers to read up to 4GB of process memory or cause a denial of service through crashes. The vulnerability affects GStreamer versions prior to 1.24.10 and requires no authentication to exploit over the network. With an EPSS score of only 0.08%, real-world exploitation appears limited, and no known proof-of-concept or active exploitation has been reported.

Technical Context

GStreamer is a widely-used open-source multimedia framework for constructing media processing pipelines, identified by CPE cpe:2.3:a:gstreamer:gstreamer. The vulnerability resides in the gst_wavparse_adtl_chunk function within gstwavparse.c, where insufficient validation of a size parameter leads to a classic out-of-bounds read condition (CWE-125). When processing specially crafted WAV files, the parser fails to properly bounds-check the size value before entering a while loop, potentially reading memory beyond the allocated data buffer boundaries.

Affected Products

GStreamer versions prior to 1.24.10 are vulnerable to this out-of-bounds read issue, as identified by CPE cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. The vulnerability specifically affects the WAV file parsing functionality within the GStreamer multimedia framework. Debian has issued security updates for their LTS distributions as noted in their security announcement at https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html. The vendor has published security advisory SA-2024-0027 at https://gstreamer.freedesktop.org/security/sa-2024-0027.html detailing the issue.

Remediation

Upgrade GStreamer to version 1.24.10 or later, which contains the fix for this vulnerability. The patch is available at https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch and should be applied through your distribution's package manager or by building from source. For systems that cannot be immediately updated, consider implementing input validation for WAV files before processing them through GStreamer, or isolating GStreamer processes in sandboxed environments to limit the impact of potential memory disclosure. Consult the vendor security advisory at https://gstreamer.freedesktop.org/security/sa-2024-0027.html for additional guidance.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

CVE-2024-47778 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy