CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
Tencent RapidJSON is vulnerable to privilege escalation due to an integer
underflow in the GenericReader::ParseNumber()
function of
include/rapidjson/reader.h
when parsing JSON text from a stream. An
attacker needs to send the victim a crafted file which needs to be opened;
this triggers the integer underflow vulnerability (when the file is
parsed), leading to elevation of privilege.
github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001
github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001
launchpad.net/bugs/cve/CVE-2024-38517
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517
nvd.nist.gov/vuln/detail/CVE-2024-38517
security-tracker.debian.org/tracker/CVE-2024-38517
www.cve.org/CVERecord?id=CVE-2024-38517