Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-38517

Опубликовано: 09 июл. 2024
Источник: debian
EPSS Низкий

Описание

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rapidjsonfixed1.1.0+dfsg2-7.4package
rapidjsonno-dsabookwormpackage
rapidjsonpostponedbullseyepackage

Примечания

  • https://github.com/Tencent/rapidjson/pull/1261

  • https://github.com/Tencent/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001

EPSS

Процентиль: 18%
0.00057
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
redhat
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
nvd
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
msrc
12 месяцев назад

Github: CVE-2024-38517 TenCent RapidJSON Elevation of Privilege Vulnerability

CVSS3: 7.8
fstec
около 1 года назад

Уязвимость функции GenericReader::ParseNumber() библиотеки для обработки JSON-файлов RapidJSON операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 18%
0.00057
Низкий