We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-38517

Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow



Description

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

Reserved 2024-06-18 | Published 2024-07-09 | Updated 2024-09-05 | Assigner GitHub_M


MEDIUM: 6.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-191: Integer Underflow (Wrap or Wraparound)

Product status

<= 1.1.0
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517

github.com/...mmits/8269bc2bc289e9d343bae51cdf6d23ef0950e001

github.com/...ommit/8269bc2bc289e9d343bae51cdf6d23ef0950e001

cve.org (CVE-2024-38517)

nvd.nist.gov (CVE-2024-38517)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-38517

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.