CVE-2024-38517

Name
CVE-2024-38517
Description
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517
MISC https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001
MISC https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001

Match rules

CPE URI Source package Min version Max version
rapidjson >= 0 <= 1.1.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
rapidjson 3.20-community 1.1.0-r5 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
rapidjson edge-community 1.1.0-r7 Jakub Jirutka <jakub@jirutka.cz> fixed
rapidjson 3.21-community 1.1.0-r7 Jakub Jirutka <jakub@jirutka.cz> fixed