Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
References
Configurations
No configuration.
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001 - | |
References | () https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001 - | |
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517 - |
11 Jul 2024, 13:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Jul 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-09 19:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38517
Mitre link : CVE-2024-38517
CVE.ORG link : CVE-2024-38517
JSON object : View
Products Affected
No product.
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)