Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-39684

Опубликовано: 09 июл. 2024
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the GenericReader::ParseNumber() function of include/rapidjson/reader.h when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.

A flaw was found in the RapidJSON package. This flaw allows a local attacker to trigger an integer overflow via a specially crafted file, possibly leading to the escalation of privileges.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Openshift Data Foundation 4odf4/mcg-core-rhel9Affected
Red Hat OpenStack Platform 17.1leathermanWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=2296855rapidjson: pivilege escalation via integer overflow in GenericReader::ParseNumber()

EPSS

Процентиль: 16%
0.00051
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
nvd
около 1 года назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
msrc
около 1 года назад

Github: CVE-2024-39684 TenCent RapidJSON Elevation of Privilege Vulnerability

CVSS3: 7.8
debian
около 1 года назад

Tencent RapidJSON is vulnerable to privilege escalation due to an inte ...

CVSS3: 7.8
fstec
около 1 года назад

Уязвимость функции GenericReader::ParseNumber() библиотеки для обработки JSON-файлов RapidJSON операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 16%
0.00051
Низкий

7.8 High

CVSS3