Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME


A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions.

According to reports, vulnerabilities, spanning critical issues such as out-of-bounds writes, stack-buffer overflows, and null pointer dereferences, pose significant risks to widely used Linux distributions like Ubuntu, Fedora, and openSUSE.

GStreamer: A Critical Component in GNOME Environments

GStreamer serves as the backbone for multimedia functionality in GNOME environments. It powers applications such as Nautilus (file manager), GNOME Videos, and Rhythmbox.

Furthermore, it supports a wide array of media formats, including MP4, MKV, OGG, and AVI. Its integration into essential components like tracker miners (metadata indexers) makes it a high-value target for attackers.

MP4 File structure

The vulnerabilities were identified during an extensive security audit that focused on GStreamer’s “Base” and “Good” plugins—modules included by default in many Linux distributions.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

The research revealed 29 previously unknown vulnerabilities, many of which affect the MP4 and MKV parsers.

Among the most critical issues are:

Out-of-Bounds Writes: Found in components like `isomp4/qtdemux.c` and `gst_parse_vorbis_setup_packet`, these flaws could allow attackers to execute arbitrary code.

Stack-Buffer Overflows: Vulnerabilities such as those in `vorbis_handle_identification_packet` and `gst_opus_dec_parse_header` could lead to crashes or exploitation.

Null Pointer Dereferences: Multiple instances were discovered, including in `id3v2_read_synch_uint` and `gst_matroska_demux_update_tracks`, potentially causing application crashes.

Use-After-Free Issues: A vulnerability in Matroska CodecPrivate handling could lead to memory corruption.

These vulnerabilities have been assigned CVEs (Common Vulnerabilities and Exposures) for tracking and resolution. For example, CVE-2024-47537 highlights an out-of-bounds write in MP4 parsing, while CVE-2024-47834 addresses a use-after-free issue.

The identified vulnerabilities could be exploited through malicious media files or streams. Since GStreamer is deeply embedded in GNOME-based systems, attackers could target applications that automatically process media files.

This includes scenarios where users preview files in file managers or play media using default applications.

The GStreamer development team has been proactive in addressing these issues. Security patches have been released for affected components. Users are strongly advised to update their systems promptly to mitigate potential risks.

This discovery underscores the importance of rigorous security testing for open-source projects that form the foundation of widely used operating systems.

As multimedia frameworks like GStreamer continue to evolve, maintaining robust security practices will be critical to safeguarding users against emerging threats.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free



Source link