CVE-2024-47778
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Description
GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.
Analysis
An out-of-bounds read vulnerability exists in GStreamer's WAV parser that allows remote attackers to read up to 4GB of process memory or cause a denial of service through crashes. The vulnerability affects GStreamer versions prior to 1.24.10 and requires no authentication to exploit over the network. With an EPSS score of only 0.08%, real-world exploitation appears limited, and no known proof-of-concept or active exploitation has been reported.
Technical Context
GStreamer is a widely-used open-source multimedia framework for constructing media processing pipelines, identified by CPE cpe:2.3:a:gstreamer:gstreamer. The vulnerability resides in the gst_wavparse_adtl_chunk function within gstwavparse.c, where insufficient validation of a size parameter leads to a classic out-of-bounds read condition (CWE-125). When processing specially crafted WAV files, the parser fails to properly bounds-check the size value before entering a while loop, potentially reading memory beyond the allocated data buffer boundaries.
Affected Products
GStreamer versions prior to 1.24.10 are vulnerable to this out-of-bounds read issue, as identified by CPE cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*. The vulnerability specifically affects the WAV file parsing functionality within the GStreamer multimedia framework. Debian has issued security updates for their LTS distributions as noted in their security announcement at https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html. The vendor has published security advisory SA-2024-0027 at https://gstreamer.freedesktop.org/security/sa-2024-0027.html detailing the issue.
Remediation
Upgrade GStreamer to version 1.24.10 or later, which contains the fix for this vulnerability. The patch is available at https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch and should be applied through your distribution's package manager or by building from source. For systems that cannot be immediately updated, consider implementing input validation for WAV files before processing them through GStreamer, or isolating GStreamer processes in sandboxed environments to limit the impact of potential memory disclosure. Consult the vendor security advisory at https://gstreamer.freedesktop.org/security/sa-2024-0027.html for additional guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today