Bug 2292335 (CVE-2024-0444) - CVE-2024-0444 gstreamer: AV1 Video Parsing Stack-based Buffer Overflow
Summary: CVE-2024-0444 gstreamer: AV1 Video Parsing Stack-based Buffer Overflow
Keywords:
Status: NEW
Alias: CVE-2024-0444
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2292336 2292337
Blocks: 2292338
TreeView+ depends on / blocked
 
Reported: 2024-06-14 04:14 UTC by Pedro Sampaio
Modified: 2024-06-14 13:15 UTC (History)
0 users

Fixed In Version:
Doc Type: ---
Doc Text:
A stack-based buffer overflow flaw was found in GStreamer. This issue may lead to code execution while parsing tile list data within AV1-encoded video files.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2024-06-14 04:14:36 UTC
GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of tile list data within AV1-encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22873.

https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/f368d63ecd89e01fd2cf0b1c4def5fc782b2c390
https://www.zerodayinitiative.com/advisories/ZDI-24-567/

Comment 1 Pedro Sampaio 2024-06-14 04:14:51 UTC
Created gstreamer1 tracking bugs for this issue:

Affects: fedora-all [bug 2292336]

Comment 2 Pedro Sampaio 2024-06-14 04:16:38 UTC
Created mingw-gstreamer1 tracking bugs for this issue:

Affects: fedora-all [bug 2292337]


Note You need to log in before you can comment on or make changes to this bug.