CVE-2024-47599

7.5 HIGH

📋 TL;DR

A null pointer dereference vulnerability in GStreamer's JPEG decoder can cause segmentation faults when processing malformed JPEG files. This leads to Denial of Service (DoS) by crashing applications using GStreamer. Affects any software using vulnerable GStreamer versions for media processing.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer library (e.g., media players, video editors, streaming software)
Versions: GStreamer versions before 1.24.10
Operating Systems: Linux, Windows, macOS, BSD - any OS running GStreamer
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing JPEG files through the affected decoder component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to service disruption, potentially affecting media processing pipelines, video players, or streaming services.

🟠

Likely Case

Application crash when processing specifically crafted JPEG files, causing temporary DoS until service restart.

🟢

If Mitigated

Minimal impact with proper input validation and sandboxing; crashes would be contained to individual processes.

🌐 Internet-Facing: MEDIUM - Exploitable if application processes user-uploaded JPEG files, but requires specific malformed input.
🏢 Internal Only: LOW - Requires local access or internal file processing; less likely to be exploited intentionally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending/processing a malformed JPEG file; no authentication needed if application accepts external files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.10

Vendor Advisory: https://gstreamer.freedesktop.org/security/sa-2024-0016.html

Restart Required: Yes

Instructions:

1. Update GStreamer to version 1.24.10 or later. 2. For Linux distributions: Use package manager (apt-get update && apt-get upgrade gstreamer1.0). 3. For source builds: Download from gstreamer.freedesktop.org and rebuild. 4. Restart affected applications.

🔧 Temporary Workarounds

Disable JPEG decoding

linux

Temporarily disable JPEG processing in GStreamer pipelines if not required

export GST_PLUGIN_PATH=/usr/lib/gstreamer-1.0/ (adjust path) and remove jpegdec plugin

Input validation

all

Implement file type validation before passing to GStreamer

🧯 If You Can't Patch

  • Implement strict input validation for JPEG files before processing
  • Run GStreamer in containerized/sandboxed environments to limit crash impact

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version: gst-inspect-1.0 --version | grep version

Check Version:

gst-inspect-1.0 --version

Verify Fix Applied:

Verify version is 1.24.10 or higher: gst-inspect-1.0 --version

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault (SIGSEGV) errors in application logs
  • GStreamer process crashes with null pointer references

Network Indicators:

  • Unusual JPEG file uploads to media processing endpoints

SIEM Query:

process.name:"gst-launch" AND event.action:"segmentation_fault"

🔗 References

📤 Share & Export