Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-52531

Опубликовано: 11 нояб. 2024
Источник: redhat
CVSS3: 9
EPSS Низкий

Описание

GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).

A flaw was found in the libsoup library. Decoding specially crafted UTF-8 input data with the soup_header_parse_param_list_strict function can cause a heap-based buffer overflow, potentially resulting in code execution and denial of service to applications linked to the library.

Отчет

Further investigation found that this issue can be exploited remotely, increasing the possibility of exploitation and the severity of this vulnerability. Only applications that decode UTF-8 input data with the soup_header_parse_param_list_strict function are vulnerable to this issue. Furthermore, exploitation of this vulnerability highly depends on the application code, the heap layout and functionalities exposed to an attacker. For this reason, this flaw has been rated with an Important severity.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsoup3Affected
Red Hat Enterprise Linux 6libsoupOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportlibsoupFixedRHSA-2025:104705.02.2025
Red Hat Enterprise Linux 8libsoupFixedRHSA-2025:083830.01.2025
Red Hat Enterprise Linux 8libsoupFixedRHSA-2025:083830.01.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportlibsoupFixedRHSA-2025:090303.02.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportlibsoupFixedRHSA-2025:088903.02.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicelibsoupFixedRHSA-2025:088903.02.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionslibsoupFixedRHSA-2025:088903.02.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportlibsoupFixedRHSA-2025:094904.02.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2325277libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict

EPSS

Процентиль: 30%
0.00106
Низкий

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
7 месяцев назад

GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).

CVSS3: 6.5
nvd
7 месяцев назад

GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).

CVSS3: 8.4
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 6.5
debian
7 месяцев назад

GNOME libsoup before 3.6.1 allows a buffer overflow in applications th ...

rocky
4 месяца назад

Important: libsoup security update

EPSS

Процентиль: 30%
0.00106
Низкий

9 Critical

CVSS3