Stack-based Buffer Overflow Affecting gstreamer/gstreamer package, versions [,1.24.10)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GSTREAMERGSTREAMER-8501880
  • published13 Dec 2024
  • disclosed11 Dec 2024
  • creditAntonio Morales

Introduced: 11 Dec 2024

NewCVE-2024-47607  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade gstreamer/gstreamer to version 1.24.10 or higher.

Overview

Affected versions of this package are vulnerable to Stack-based Buffer Overflow through the gst_opus_dec_parse_header function. An attacker can overwrite the EIP address allocated in the stack by manipulating the n_channels value to exceed 64, leading to arbitrary code execution.

CVSS Scores

version 4.0
version 3.1