CVE-2024-39684

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.
Configurations

No configuration.

History

21 Nov 2024, 09:28

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240905-0003/ -
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684 - () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684 -

11 Jul 2024, 13:06

Type Values Removed Values Added
Summary
  • (es) Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento de enteros en la función `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la víctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevación de privilegios.

09 Jul 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-09 19:15

Updated : 2024-11-21 09:28


NVD link : CVE-2024-39684

Mitre link : CVE-2024-39684

CVE.ORG link : CVE-2024-39684


JSON object : View

Products Affected

No product.

CWE
CWE-190

Integer Overflow or Wraparound