CVE-2024-49776

6.5 MEDIUM

📋 TL;DR

A negative-size-param vulnerability in tsMuxer allows attackers to cause Denial of Service (DoS) by processing a specially crafted TS video file. This affects users who process untrusted video files with the vulnerable version of tsMuxer. The vulnerability can crash the application, disrupting video processing operations.

💻 Affected Systems

Products:
  • tsMuxer
Versions: nightly-2024-04-05-01-53-02
Operating Systems: All platforms running tsMuxer (Windows, Linux, macOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where tsMuxer processes TS video files from untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to service disruption, potentially affecting batch processing systems or services relying on tsMuxer for video processing.

🟠

Likely Case

Application crash when processing malicious TS files, causing temporary DoS for individual users or automated processing pipelines.

🟢

If Mitigated

No impact if proper input validation and file sanitization are implemented before processing.

🌐 Internet-Facing: MEDIUM - Only affects systems that process user-uploaded TS video files, which is less common than web application vulnerabilities.
🏢 Internal Only: LOW - Primarily affects video processing workflows; not typically exposed to internal network attacks unless processing untrusted content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the attacker to provide a crafted TS file to the application, which is straightforward if file upload/processing is allowed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest tsMuxer releases after the vulnerability disclosure

Vendor Advisory: https://github.com/justdan96/tsMuxer/issues/862

Restart Required: No

Instructions:

1. Update tsMuxer to the latest version from the official repository. 2. Replace the vulnerable binary with the patched version. 3. No restart needed as it's a standalone application.

🔧 Temporary Workarounds

Input Validation

all

Implement file validation before processing TS files with tsMuxer

Sandbox Processing

linux

Run tsMuxer in a container or sandboxed environment to limit impact of crashes

docker run --rm -v $(pwd):/data tsMuxer-container

🧯 If You Can't Patch

  • Isolate tsMuxer to process only trusted video files from known sources
  • Implement monitoring for application crashes and alert on abnormal patterns

🔍 How to Verify

Check if Vulnerable:

Check tsMuxer version: tsMuxeR --version should show nightly-2024-04-05-01-53-02 or earlier

Check Version:

tsMuxeR --version

Verify Fix Applied:

Update to latest version and verify the version number has changed from the vulnerable version

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from tsMuxer
  • Abnormal termination of tsMuxer processes

Network Indicators:

  • Unusual uploads of TS video files to processing systems

SIEM Query:

process_name="tsMuxeR" AND event_type="crash"

🔗 References

📤 Share & Export