CVE-2024-47776: GHSL-2024-260: GStreamer has a OOB-read in gst_wavparse_cue_chunk

5.1 CVSS

Description

GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size < 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.

Classification

CVE ID: CVE-2024-47776

CVSS Base Severity: MEDIUM

CVSS Base Score: 5.1

Affected Products

Vendor: gstreamer

Product: gstreamer

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 28.33% (scored less or equal to compared to others)

EPSS Date: 2025-02-04 (when was this score calculated)

References

https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch
https://gstreamer.freedesktop.org/security/sa-2024-0027.html

Timeline