Description
Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38186 | Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege. |
Ubuntu USN |
USN-8189-1 | RapidJSON vulnerability |
References
History
Thu, 05 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Tencent
Tencent rapidjson |
|
| References |
| |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-05T08:03:37.023Z
Reserved: 2024-06-27T18:44:13.034Z
Link: CVE-2024-39684
Updated: 2024-09-05T08:03:37.023Z
Status : Deferred
Published: 2024-07-09T19:15:12.700
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-39684
OpenCVE Enrichment
Updated: 2025-07-12T22:15:39Z
Weaknesses
EUVD
Ubuntu USN