CVE-2024-47834

9.1 CRITICAL

📋 TL;DR

A use-after-free vulnerability in GStreamer's Matroska demuxer allows reading freed memory when processing CodecPrivate elements. This can lead to crashes, information disclosure, or potentially code execution. Any application using GStreamer to process Matroska media files is affected.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer library
Versions: All versions before 1.24.10
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects processing of Matroska (.mkv, .webm) files with CodecPrivate elements.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if combined with other vulnerabilities or memory corruption techniques.

🟠

Likely Case

Application crashes (denial of service) or information disclosure from freed memory contents.

🟢

If Mitigated

Application crash with minimal data exposure if memory protections are enabled.

🌐 Internet-Facing: HIGH - Media processing applications accepting user-uploaded Matroska files are directly exposed.
🏢 Internal Only: MEDIUM - Internal media processing workflows could be exploited by malicious insiders or through compromised files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious Matroska files. No public exploits known as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.10

Vendor Advisory: https://gstreamer.freedesktop.org/security/sa-2024-0030.html

Restart Required: Yes

Instructions:

1. Update GStreamer to version 1.24.10 or later. 2. Restart all applications using GStreamer. 3. Rebuild any applications statically linked to GStreamer.

🔧 Temporary Workarounds

Disable Matroska processing

all

Block or filter Matroska file processing in applications

Configure applications to reject .mkv/.webm files
Use file type filtering at network boundaries

Memory hardening

all

Enable ASLR and other memory protections

sysctl -w kernel.randomize_va_space=2
Enable DEP/ASLR in Windows

🧯 If You Can't Patch

  • Isolate media processing to dedicated systems with restricted network access
  • Implement strict file upload validation rejecting Matroska files

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version: gst-inspect-1.0 --version

Check Version:

gst-inspect-1.0 --version

Verify Fix Applied:

Confirm version is 1.24.10 or higher: gst-inspect-1.0 --version | grep -q '1.24.10\|1.25\|2.'

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Memory access violation errors in logs

Network Indicators:

  • Unexpected Matroska file uploads to media processing endpoints

SIEM Query:

source="application.logs" AND ("segmentation fault" OR "SIGSEGV") AND process="*gstreamer*"

🔗 References

📤 Share & Export