Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
The product writes data past the end, or before the beginning, of the intended buffer.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Link | Tags |
---|---|
https://github.com/GStreamer/orc | product |
https://gstreamer.freedesktop.org/modules/orc.html | product |
https://jvn.jp/en/jp/JVN02030803/ | third party advisory |
http://www.openwall.com/lists/oss-security/2024/07/26/1 | third party advisory |