CVE-2024-38517
Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento insuficiente de enteros en la función `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la víctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevación de privilegios.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-06-18 CVE Reserved
- 2024-07-09 CVE Published
- 2024-07-10 EPSS Updated
- 2024-09-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-191: Integer Underflow (Wrap or Wraparound)
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | X_refsource_misc | |
https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001 | X_refsource_misc | |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|