CVE-2024-38950

6.5 MEDIUM

📋 TL;DR

CVE-2024-38950 is a heap buffer overflow vulnerability in Libde265 v1.0.15 that allows attackers to crash applications via crafted payloads to the __interceptor_memcpy function. This affects any software using the vulnerable Libde265 library for HEVC/H.265 video decoding. Attackers can trigger denial of service conditions.

💻 Affected Systems

Products:
  • Libde265
  • Software using Libde265 library for HEVC/H.265 decoding
Versions: v1.0.15 specifically
Operating Systems: Linux, Windows, macOS, BSD systems
Default Config Vulnerable: ⚠️ Yes
Notes: Any application linking against vulnerable Libde265 versions is affected when processing HEVC video files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if combined with other vulnerabilities or memory corruption techniques.

🟠

Likely Case

Application crash and denial of service, potentially disrupting video processing services.

🟢

If Mitigated

Limited to application crash with proper sandboxing and memory protection mechanisms.

🌐 Internet-Facing: MEDIUM - Applications processing untrusted video files from external sources are vulnerable.
🏢 Internal Only: LOW - Risk is limited to systems processing malicious video files internally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires crafting malicious HEVC video files. Public PoC demonstrates crash via memcpy overflow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.0.16 or later

Vendor Advisory: https://github.com/strukturag/libde265/issues/460

Restart Required: Yes

Instructions:

1. Update Libde265 to v1.0.16 or later. 2. Recompile applications using the library. 3. Restart affected services.

🔧 Temporary Workarounds

Disable HEVC processing

all

Temporarily disable HEVC/H.265 video processing in applications.

Application-specific configuration changes required

Input validation

all

Implement strict validation of HEVC video files before processing.

Implement file validation in application code

🧯 If You Can't Patch

  • Isolate vulnerable systems from untrusted networks
  • Implement strict file upload restrictions and scanning for HEVC files

🔍 How to Verify

Check if Vulnerable:

Check Libde265 version: ldd --version | grep libde265 or check application dependencies.

Check Version:

pkg-config --modversion libde265

Verify Fix Applied:

Verify Libde265 version is v1.0.16 or later and test with known malicious HEVC samples.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Memory corruption errors in system logs

Network Indicators:

  • Unusual HEVC file uploads to video processing services

SIEM Query:

source="application.log" AND ("segmentation fault" OR "heap corruption") AND process="*libde265*"

🔗 References

📤 Share & Export