THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-38517

Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow

AssignerGitHub_M
Reserved2024-06-18
Published2024-07-09
Updated2024-07-23

Description

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.



MEDIUM: 6.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-191: Integer Underflow (Wrap or Wraparound)

Product status

<= 1.1.0
affected

References

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517

https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001

https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001

cve.org CVE-2024-38517

nvd.nist.gov CVE-2024-38517

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-38517
© Copyright 2024 THREATINT. Made in Cyprus with +