
Cloud Vulnerability DB
A community-led vulnerabilities database
GStreamer, a library for constructing graphs of media-handling components, was found to contain a stack-buffer overflow vulnerability (CVE-2024-47607) in the gstopusdecparseheader function within gstopusdec.c. The vulnerability was discovered and reported by Antonio Morales from the GitHub Security Lab team. The issue affects GStreamer versions prior to 1.24.10, where the pos array, a stack-allocated buffer of size 64, can be overflowed if nchannels exceeds 64 ([GitHub Advisory](https://securitylab.github.com/advisories/GHSL-2024-115GHSL-2024-118_Gstreamer/), GStreamer Advisory).
The vulnerability exists in the gstopusdecparseheader function where a stack-allocated buffer (pos array) of size 64 is used. If the nchannels parameter exceeds 64, the for loop writes beyond the array boundaries. The value written during the overflow is always GSTAUDIOCHANNELPOSITION_NONE. The CVSS v3.1 base score for this vulnerability is 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
The vulnerability allows an attacker to overwrite the EIP address allocated in the stack, potentially leading to arbitrary code execution. This buffer overflow can result in application crashes and potential remote code execution when processing maliciously crafted input files (GitHub Advisory).
The vulnerability has been fixed in GStreamer version 1.24.10. Users are advised to upgrade to this version or apply the available patch. For those using older branches of GStreamer, the patch can be applied and the software recompiled (GStreamer Advisory, Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."