CVE-2025-47807

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in GStreamer's subparse plugin allows attackers to cause denial of service by crashing applications that process malicious subtitle files. This affects any application using GStreamer 1.26.1 or earlier to parse subtitle files. The vulnerability is triggered when processing specially crafted subtitle content.

💻 Affected Systems

Products:
  • GStreamer
  • Applications using GStreamer for subtitle parsing
Versions: GStreamer through version 1.26.1
Operating Systems: Linux, Windows, macOS, BSD systems with GStreamer
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when subtitle parsing is enabled and processing subtitle files. Many media players and video processing tools use GStreamer.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service for media processing applications, potentially disrupting media playback or processing services.

🟠

Likely Case

Application crash when processing malicious subtitle files, requiring restart of affected media applications.

🟢

If Mitigated

No impact if subtitle parsing is disabled or if applications don't process untrusted subtitle files.

🌐 Internet-Facing: MEDIUM - Applications processing user-uploaded subtitle files could be targeted to cause service disruption.
🏢 Internal Only: LOW - Requires processing of malicious subtitle files, which is less likely in controlled internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to supply malicious subtitle file to vulnerable application. No authentication bypass needed if application accepts subtitle files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GStreamer 1.26.2 or later

Vendor Advisory: https://gstreamer.freedesktop.org/security/

Restart Required: No

Instructions:

1. Check current GStreamer version. 2. Update to GStreamer 1.26.2 or later using your distribution's package manager. 3. For source installations, download and compile latest version from gstreamer.freedesktop.org.

🔧 Temporary Workarounds

Disable subparse plugin

Linux

Remove or disable the vulnerable subparse plugin to prevent subtitle parsing

gst-inspect-1.0 --plugin-filters=name=subparse
sudo rm /usr/lib/gstreamer-1.0/libgstsubparse.so

🧯 If You Can't Patch

  • Implement input validation for subtitle files before processing
  • Run GStreamer applications in sandboxed/containerized environments

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version: gst-inspect-1.0 --version | grep 'GStreamer'

Check Version:

gst-inspect-1.0 --version

Verify Fix Applied:

Verify version is 1.26.2 or later: gst-inspect-1.0 --version

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation fault when processing subtitle files
  • GStreamer error logs mentioning subparse or subtitle parsing failures

Network Indicators:

  • Unusual subtitle file downloads to media processing servers

SIEM Query:

source="application.log" AND ("segmentation fault" OR "NULL pointer") AND ("gstreamer" OR "subtitle")

🔗 References

📤 Share & Export