Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-42415

Опубликовано: 03 окт. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 8.4

Описание

An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

РелизСтатусПримечание
devel

released

1.14.52-1ubuntu0.1
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

needs-triage

esm-infra/focal

released

1.14.46-1ubuntu0.1
focal

released

1.14.46-1ubuntu0.1
jammy

released

1.14.47-1ubuntu0.1
noble

released

1.14.51-2ubuntu0.1
oracular

released

1.14.52-1ubuntu0.1
plucky

released

1.14.52-1ubuntu0.1

Показывать по

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.4
redhat
больше 1 года назад

An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 8.4
nvd
больше 1 года назад

An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 8.4
debian
больше 1 года назад

An integer overflow vulnerability exists in the Compound Document Bina ...

CVSS3: 8.4
github
больше 1 года назад

An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 7.8
fstec
больше 1 года назад

Уязвимость библиотеки структурированных файлов The GNOME Project libgsf, связанная с переполнением целых чисел на основе динамической памяти, позволяющая нарушителю выполнить произвольный код

8.4 High

CVSS3