CVE-2024-40897

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer:orc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:31

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/07/26/1 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2024/07/26/1 - Third Party Advisory
References () https://github.com/GStreamer/orc - Product () https://github.com/GStreamer/orc - Product
References () https://gstreamer.freedesktop.org/modules/orc.html - Product () https://gstreamer.freedesktop.org/modules/orc.html - Product
References () https://jvn.jp/en/jp/JVN02030803/ - Third Party Advisory () https://jvn.jp/en/jp/JVN02030803/ - Third Party Advisory

27 Aug 2024, 13:52

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : 7.0
v2 : unknown
v3 : 6.7
References () http://www.openwall.com/lists/oss-security/2024/07/26/1 - () http://www.openwall.com/lists/oss-security/2024/07/26/1 - Third Party Advisory
References () https://github.com/GStreamer/orc - () https://github.com/GStreamer/orc - Product
References () https://gstreamer.freedesktop.org/modules/orc.html - () https://gstreamer.freedesktop.org/modules/orc.html - Product
References () https://jvn.jp/en/jp/JVN02030803/ - () https://jvn.jp/en/jp/JVN02030803/ - Third Party Advisory
CPE cpe:2.3:a:gstreamer:orc:*:*:*:*:*:*:*:*
First Time Gstreamer
Gstreamer orc

01 Aug 2024, 13:58

Type Values Removed Values Added
CWE CWE-121
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0

28 Jul 2024, 14:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/26/1 -

26 Jul 2024, 12:38

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en orcparse.c de versiones de ORC anteriores a la 0.4.39. Si se engaña a un desarrollador para que procese un archivo especialmente manipulado con el compilador ORC afectado, se puede ejecutar un código arbitrario en el entorno de compilación del desarrollador. Esto puede poner en peligro las máquinas de desarrollo o los entornos de compilación de CI.

26 Jul 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-26 06:15

Updated : 2024-11-21 09:31


NVD link : CVE-2024-40897

Mitre link : CVE-2024-40897

CVE.ORG link : CVE-2024-40897


JSON object : View

Products Affected

gstreamer

  • orc
CWE
CWE-787

Out-of-bounds Write

CWE-121

Stack-based Buffer Overflow