CVE-2024-24267

7.5 HIGH

📋 TL;DR

This vulnerability in GPAC multimedia framework allows memory exhaustion through a memory leak in the gf_fileio_from_blob function. Attackers could cause denial of service by repeatedly triggering the leak, potentially crashing affected systems. Users and applications processing multimedia files with vulnerable GPAC versions are affected.

💻 Affected Systems

Products:
  • GPAC Multimedia Framework
Versions: v2.2.1 and earlier (fixed in v2.4.0)
Operating Systems: All platforms running GPAC
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when processing multimedia files through affected functions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to complete system memory exhaustion, causing system crashes, service disruption, and potential data loss in affected applications.

🟠

Likely Case

Denial of service through gradual memory consumption, potentially crashing multimedia processing applications or services using GPAC.

🟢

If Mitigated

Limited impact with proper memory monitoring and restart policies; isolated to specific multimedia processing functions.

🌐 Internet-Facing: MEDIUM - Applications processing user-uploaded multimedia content could be targeted, but requires specific file processing.
🏢 Internal Only: LOW - Requires local access or integration into vulnerable workflows; less likely to be exploited internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Memory leak vulnerabilities typically require repeated triggering; no public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.4.0

Vendor Advisory: https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234

Restart Required: Yes

Instructions:

1. Download GPAC v2.4.0 or later from official repository. 2. Uninstall current version. 3. Install patched version. 4. Restart any services using GPAC.

🔧 Temporary Workarounds

Memory Limit Enforcement

linux

Limit memory usage of GPAC processes to contain potential memory exhaustion

ulimit -v 1048576
systemctl set-property gpac.service MemoryMax=1G

🧯 If You Can't Patch

  • Implement strict input validation for multimedia files processed by GPAC
  • Monitor memory usage of GPAC processes and restart when thresholds exceeded

🔍 How to Verify

Check if Vulnerable:

Check GPAC version: gpac -version | grep 'GPAC'

Check Version:

gpac -version

Verify Fix Applied:

Verify version is v2.4.0 or later: gpac -version

📡 Detection & Monitoring

Log Indicators:

  • Abnormal memory consumption patterns
  • GPAC process crashes
  • Repeated file processing errors

Network Indicators:

  • Unusual multimedia file upload patterns
  • Repeated requests to multimedia processing endpoints

SIEM Query:

Process:gpac AND (MemoryUsage > 90% OR ExitCode != 0)

🔗 References

📤 Share & Export