Metrics
Affected Vendors & Products
Wed, 18 Dec 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gstreamer Project
Gstreamer Project gstreamer |
|
CPEs | cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gstreamer Project
Gstreamer Project gstreamer |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 13 Dec 2024 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 11 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Dec 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size < 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10. | |
Title | GHSL-2024-260: GStreamer has a OOB-read in gst_wavparse_cue_chunk | |
Weaknesses | CWE-125 | |
References |
| |
Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-11T19:16:04.573Z
Updated: 2024-12-11T21:06:56.613Z
Reserved: 2024-09-30T21:28:53.234Z
Link: CVE-2024-47776
Updated: 2024-12-11T21:06:50.715Z
Status : Analyzed
Published: 2024-12-12T02:03:40.557
Modified: 2024-12-18T19:28:07.190
Link: CVE-2024-47776