CVE-2024-47606

9.8 CRITICAL

📋 TL;DR

This vulnerability in GStreamer's qtdemux component allows integer underflow leading to heap corruption and arbitrary code execution. Attackers can exploit it by tricking users into opening malicious media files. Any application using vulnerable GStreamer versions is affected.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer library
Versions: All versions before 1.24.10
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing specially crafted media files with Theora video codec extension.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution with the privileges of the application using GStreamer, potentially leading to complete system compromise.

🟠

Likely Case

Application crash (denial of service) or limited code execution depending on exploit reliability and memory layout.

🟢

If Mitigated

No impact if patched or if vulnerable component is not used for processing untrusted media files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open malicious media file. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.10

Vendor Advisory: https://gstreamer.freedesktop.org/security/sa-2024-0014.html

Restart Required: Yes

Instructions:

1. Update GStreamer to version 1.24.10 or later. 2. For Linux distributions, use package manager: 'sudo apt update && sudo apt upgrade gstreamer1.0' (Debian/Ubuntu) or 'sudo yum update gstreamer' (RHEL/CentOS). 3. Restart applications using GStreamer.

🔧 Temporary Workarounds

Disable qtdemux plugin

linux

Remove or disable the vulnerable qtdemux component to prevent exploitation

gst-inspect-1.0 --plugin-filters | grep qtdemux
mv /usr/lib/gstreamer-1.0/libgstqtdemux.so /usr/lib/gstreamer-1.0/libgstqtdemux.so.disabled

🧯 If You Can't Patch

  • Restrict media file processing to trusted sources only
  • Implement application sandboxing to limit potential damage from exploitation

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version: 'gst-inspect-1.0 --version' and verify if below 1.24.10

Check Version:

gst-inspect-1.0 --version

Verify Fix Applied:

Confirm version is 1.24.10 or higher: 'gst-inspect-1.0 --version | grep -E "1\.24\.(10|[1-9][0-9])"

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing media files
  • Memory corruption errors in system logs

Network Indicators:

  • Unusual outbound connections from media processing applications

SIEM Query:

source="application_logs" AND ("segmentation fault" OR "heap corruption" OR "qtdemux")

🔗 References

📤 Share & Export