CVE-2024-49777

8.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in tsMuxer allows attackers to execute arbitrary code, cause denial of service, or disclose sensitive information by processing a specially crafted MKV video file. This affects users who process untrusted video files with the vulnerable version of tsMuxer. The vulnerability is particularly dangerous as it can be triggered without authentication.

💻 Affected Systems

Products:
  • tsMuxer
Versions: nightly-2024-03-14-01-51-12 and potentially earlier versions
Operating Systems: All platforms where tsMuxer runs (Windows, Linux, macOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Any system using the vulnerable version to process MKV files is affected. The vulnerability is in the MKV parsing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution with the privileges of the tsMuxer process, potentially leading to complete system compromise.

🟠

Likely Case

Denial of service (application crash) when processing malicious MKV files, with potential information disclosure from heap memory.

🟢

If Mitigated

Application crash without code execution if exploit fails or memory protections are in place.

🌐 Internet-Facing: MEDIUM - Risk exists if tsMuxer is exposed to process files from untrusted sources over the internet.
🏢 Internal Only: MEDIUM - Risk exists when processing files from potentially compromised internal sources or user uploads.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The GitHub issue contains technical details and proof-of-concept information. Crafting a reliable exploit requires understanding of heap manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest tsMuxer releases after March 14, 2024

Vendor Advisory: https://github.com/justdan96/tsMuxer/issues/842

Restart Required: No

Instructions:

1. Check current tsMuxer version. 2. Update to the latest version from the official tsMuxer repository. 3. Verify the fix by checking version or testing with known malicious files.

🔧 Temporary Workarounds

Disable MKV processing

all

Prevent tsMuxer from processing MKV files by modifying configuration or input validation.

Run with reduced privileges

linux

Execute tsMuxer with minimal system privileges to limit potential damage from exploitation.

sudo -u nobody tsMuxer [options]

🧯 If You Can't Patch

  • Implement strict input validation - only allow processing of video files from trusted sources
  • Deploy tsMuxer in isolated containers or sandboxes with no network access

🔍 How to Verify

Check if Vulnerable:

Check if tsMuxer version is nightly-2024-03-14-01-51-12 or earlier. Test with the proof-of-concept MKV file from the GitHub issue.

Check Version:

tsMuxeR --version or check the application about dialog

Verify Fix Applied:

Update to the latest tsMuxer version and verify it no longer crashes when processing the proof-of-concept file.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults or access violations
  • Unexpected process termination when processing MKV files

Network Indicators:

  • Unusual network connections from tsMuxer process after file processing

SIEM Query:

Process: tsMuxeR AND (EventID: 1000 OR Signal: SIGSEGV) AND FileExtension: .mkv

🔗 References

📤 Share & Export