CVE-2024-47539

9.8 CRITICAL

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in GStreamer's MP4 demuxer that allows attackers to write up to 3 bytes beyond allocated memory bounds. The vulnerability affects all systems using vulnerable versions of GStreamer for media processing. With a CVSS score of 9.8, this is a critical memory corruption vulnerability that could lead to remote code execution.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer library
Versions: All versions before 1.24.10
Operating Systems: Linux, Windows, macOS, BSD, Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using GStreamer's MP4 demuxer functionality is vulnerable when processing malicious MP4 files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption potentially leading to information disclosure.

🟢

If Mitigated

Application crash with no further impact if memory protections (ASLR, DEP) are effective.

🌐 Internet-Facing: HIGH - GStreamer is commonly used in media processing applications that may handle untrusted input from the internet.
🏢 Internal Only: MEDIUM - Risk exists for internal applications processing media files, but attack surface is more limited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious MP4 file, but the vulnerability is in core library code making exploitation feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.10

Vendor Advisory: https://gstreamer.freedesktop.org/security/sa-2024-0007.html

Restart Required: Yes

Instructions:

1. Update GStreamer to version 1.24.10 or later. 2. For Linux distributions, use package manager: 'sudo apt update && sudo apt upgrade gstreamer1.0' (Debian/Ubuntu) or 'sudo yum update gstreamer' (RHEL/CentOS). 3. Restart all applications using GStreamer.

🔧 Temporary Workarounds

Disable MP4 processing

all

Disable or block MP4 file processing in applications using GStreamer

Use input validation

all

Implement strict validation of MP4 files before processing with GStreamer

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems using GStreamer
  • Deploy application allowlisting to prevent execution of unknown media processing applications

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version: 'gst-inspect-1.0 --version' or check package manager for installed version.

Check Version:

gst-inspect-1.0 --version

Verify Fix Applied:

Verify version is 1.24.10 or later: 'gst-inspect-1.0 --version | grep -q "1.24.10" && echo "Patched"'

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Memory corruption errors in system logs
  • Unexpected process termination of media applications

Network Indicators:

  • Unusual MP4 file transfers to media servers
  • Exploit kit traffic patterns

SIEM Query:

source="*syslog*" AND ("segmentation fault" OR "SIGSEGV") AND process="*gstreamer*" OR process="*media*"

🔗 References

📤 Share & Export