CVE-2024-47537

9.8 CRITICAL

📋 TL;DR

This CVE describes an integer overflow vulnerability in GStreamer's QtDemux component that can lead to out-of-bounds memory writes. Attackers can exploit this by crafting malicious media files to potentially execute arbitrary code or cause denial of service. Any application using vulnerable GStreamer versions to process media files is affected.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer for media processing
Versions: GStreamer versions before 1.24.10
Operating Systems: Linux, Windows, macOS, Android, Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in QtDemux component which handles QuickTime/MP4 files; any application using this component is vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise when processing malicious media files

🟠

Likely Case

Application crash (denial of service) or limited memory corruption

🟢

If Mitigated

Application crash with no privilege escalation if proper sandboxing/isolation is in place

🌐 Internet-Facing: HIGH - Media processing applications exposed to untrusted input are vulnerable
🏢 Internal Only: MEDIUM - Internal media processing applications could be exploited via social engineering

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious media files; no public exploit code available at time of analysis

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.10

Vendor Advisory: https://gstreamer.freedesktop.org/security/sa-2024-0005.html

Restart Required: Yes

Instructions:

1. Update GStreamer to version 1.24.10 or later. 2. For Linux distributions, use package manager: 'sudo apt update && sudo apt upgrade gstreamer1.0' (Debian/Ubuntu) or 'sudo yum update gstreamer' (RHEL/CentOS). 3. Restart affected applications. 4. Rebuild any custom applications using GStreamer libraries.

🔧 Temporary Workarounds

Disable QtDemux component

linux

Remove or disable the vulnerable QtDemux plugin to prevent processing of QuickTime/MP4 files

sudo mv /usr/lib/gstreamer-1.0/libgstqtdemux.so /usr/lib/gstreamer-1.0/libgstqtdemux.so.disabled
sudo mv /usr/lib64/gstreamer-1.0/libgstqtdemux.so /usr/lib64/gstreamer-1.0/libgstqtdemux.so.disabled

Input validation

all

Implement file type validation to reject untrusted QuickTime/MP4 files

🧯 If You Can't Patch

  • Implement strict input validation for media files, rejecting untrusted QuickTime/MP4 formats
  • Run GStreamer applications in sandboxed/containerized environments with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version: 'gst-inspect-1.0 --version' and verify if below 1.24.10

Check Version:

gst-inspect-1.0 --version

Verify Fix Applied:

Confirm version is 1.24.10 or higher: 'gst-inspect-1.0 --version | grep -q "1.24.10" && echo "Patched"'

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults in GStreamer media processing
  • Memory corruption errors in system logs when processing media files

Network Indicators:

  • Unusual media file uploads to web applications
  • Media processing servers receiving malformed QuickTime/MP4 files

SIEM Query:

source="application.logs" AND ("segmentation fault" OR "SIGSEGV") AND ("gstreamer" OR "GStreamer")

🔗 References

📤 Share & Export