CVE-2024-47613

9.8 CRITICAL

📋 TL;DR

A null pointer dereference vulnerability in GStreamer's GDK Pixbuf decoder can cause a segmentation fault when processing specially crafted media files. This leads to Denial of Service (DoS) by crashing the application. Any system using vulnerable GStreamer versions for media processing is affected.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer library
Versions: GStreamer versions before 1.24.10
Operating Systems: Linux, Unix-like systems, Windows (if GStreamer installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing media files through GDK Pixbuf decoder component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to service disruption, potentially affecting dependent services or systems.

🟠

Likely Case

Application crash when processing malicious media files, causing temporary DoS until service restart.

🟢

If Mitigated

Minimal impact with proper input validation and sandboxing, though crashes may still occur.

🌐 Internet-Facing: MEDIUM - Exploitable via media uploads or streaming, but requires specific media processing scenarios.
🏢 Internal Only: LOW - Requires local access or internal media processing workflows.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires feeding specially crafted media files to vulnerable GStreamer instances.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.10

Vendor Advisory: https://gstreamer.freedesktop.org/security/sa-2024-0025.html

Restart Required: Yes

Instructions:

1. Update GStreamer to version 1.24.10 or later. 2. Restart all applications using GStreamer. 3. Rebuild any applications statically linked to GStreamer.

🔧 Temporary Workarounds

Disable GDK Pixbuf decoder

linux

Prevent use of vulnerable decoder component

gst-inspect-1.0 | grep gdkpixbuf
# Remove or disable gdkpixbufdec plugin

🧯 If You Can't Patch

  • Implement strict input validation for media files
  • Run GStreamer processes in sandboxed/isolated environments

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version with 'gst-launch-1.0 --version' or 'gst-inspect-1.0 --version'

Check Version:

gst-launch-1.0 --version | head -1

Verify Fix Applied:

Verify version is 1.24.10 or higher and test with known safe media files

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault (SEGV) errors
  • Application crashes during media processing
  • Null pointer dereference warnings

Network Indicators:

  • Unusual media file uploads to processing services
  • Repeated connection attempts to media processing endpoints

SIEM Query:

process.name:"gst*" AND (event.action:"segmentation_fault" OR event.action:"crash")

🔗 References

📤 Share & Export