CVE-2024-38517
CVSS V2 None
CVSS V3 None
Description
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
Overview
- CVE ID
- CVE-2024-38517
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-09T18:51:50.563Z
- Last Modified Date
- 2024-07-09T18:51:50.563Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517 | x_refsource_CONFIRM |
https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | x_refsource_MISC |
https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-38517 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38517 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-07-10 13:45:43 | Added to TrackCVE |