First published: Wed May 22 2024(Updated: )
GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-23896.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gst-plugins-base1.0 | <1.16.3-0ubuntu1.3 | 1.16.3-0ubuntu1.3 |
ubuntu/gst-plugins-base1.0 | <1.20.1-1ubuntu0.2 | 1.20.1-1ubuntu0.2 |
ubuntu/gst-plugins-base1.0 | <1.22.6-1ubuntu0.1 | 1.22.6-1ubuntu0.1 |
ubuntu/gst-plugins-base1.0 | <1.24.2-1ubuntu0.1 | 1.24.2-1ubuntu0.1 |
debian/gst-plugins-base1.0 | 1.18.4-2+deb11u2 1.22.0-3+deb12u2 1.24.7-2 1.24.7-3 | |
GStreamer | ||
GStreamer | =1.24.0 | |
GStreamer | =1.24.1 | |
Debian GNU/Linux | =10.0 |
https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4453 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2024-4453, update to the fixed versions of GStreamer: 1.16.3-0ubuntu1.3 for Focal, 1.20.1-1ubuntu0.2 for Jammy, or 1.24.2-1ubuntu0.1 for Noble.
CVE-2024-4453 affects multiple versions of GStreamer, specifically versions 1.16.3 through 1.24.1 in Ubuntu and Debian systems.
CVE-2024-4453 is an integer overflow vulnerability that can lead to remote code execution.
As of now, specific public exploits for CVE-2024-4453 have not been documented, but the potential for exploitation exists.