CVE-2024-47600

9.1 CRITICAL

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in GStreamer's audio channel discovery function. Attackers can trigger memory corruption by processing specially crafted media files, potentially leading to information disclosure or denial of service. Any application using vulnerable GStreamer versions for media processing is affected.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer library
Versions: All versions before 1.24.10
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using gst-discoverer functionality for audio processing is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise via memory corruption and arbitrary code execution.

🟠

Likely Case

Application crash (denial of service) or information disclosure through memory read.

🟢

If Mitigated

Limited impact with proper sandboxing and memory protection mechanisms.

🌐 Internet-Facing: MEDIUM - Requires processing malicious media files, which could be delivered via web applications or media servers.
🏢 Internal Only: LOW - Requires local access or internal media processing applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious media files that trigger the OOB-read condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.10

Vendor Advisory: https://gstreamer.freedesktop.org/security/sa-2024-0018.html

Restart Required: Yes

Instructions:

1. Update GStreamer to version 1.24.10 or later
2. Restart all applications using GStreamer
3. Rebuild any statically linked applications with patched library

🔧 Temporary Workarounds

Disable audio discovery

all

Disable gst-discoverer functionality in applications if not required

Application-specific configuration required

Sandbox media processing

linux

Run media processing in isolated containers or sandboxes

docker run --security-opt=no-new-privileges gstreamer-app
firejail --private gstreamer-app

🧯 If You Can't Patch

  • Implement strict input validation for media files
  • Use application allowlisting to prevent unauthorized media processing

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version with: gst-inspect-1.0 --version

Check Version:

gst-inspect-1.0 --version

Verify Fix Applied:

Verify version is 1.24.10 or higher: gst-inspect-1.0 --version | grep -q '1.24.1[0-9]\|1.2[5-9]\|[2-9]\.[0-9]'

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Memory access violation errors in system logs
  • Unexpected process termination during media processing

Network Indicators:

  • Unusual media file uploads to web applications
  • Suspicious media streaming patterns

SIEM Query:

process.name:"gst-*" AND (event.action:"segmentation_fault" OR event.action:"memory_violation")

🔗 References

📤 Share & Export