Description
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-37387 | Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege. |
Ubuntu USN |
USN-7125-1 | RapidJSON vulnerability |
References
History
Thu, 05 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-05T08:03:35.926Z
Reserved: 2024-06-18T16:37:02.727Z
Link: CVE-2024-38517
Updated: 2024-09-05T08:03:35.926Z
Status : Awaiting Analysis
Published: 2024-07-09T19:15:12.470
Modified: 2024-11-21T09:26:08.690
Link: CVE-2024-38517
OpenCVE Enrichment
Updated: 2025-07-12T22:31:31Z
Weaknesses
EUVD
Ubuntu USN