Coordinated Disclosure Timeline

Project

Gstreamer

Tested Version

Details

OOB-read in gst_avi_subtitle_parse_gab2_chunk (GHSL-2024-262)

An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c

The function reads the name_length value directly from the input file without checking it properly:

  name_length = GST_READ_UINT32_LE (map.data + 5 + 2);

Then, the following condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow:

  if (map.size <= 17 + name_length)
    goto wrong_name_length;

In such scenario, the function attempts to access memory beyond the buffer with

  GST_READ_UINT16_LE(map.data + 11 + name_length)

leading to an OOB-read.

Impact

This vulnerability results in an out-of-bounds read, which may lead to application crashes or an information leak.

CVE

Credit

This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales).

Contact

You can contact the GHSL team at securitylab@github.com, please include a reference to GHSL-2024-262 in any communication regarding this issue.