Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.
History

Thu, 05 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tencent:rapidjson:*:*:*:*:*:*:*:*
Vendors & Products Tencent
Tencent rapidjson
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-07-09T18:53:53.855Z

Updated: 2024-09-05T08:03:37.023Z

Reserved: 2024-06-27T18:44:13.034Z

Link: CVE-2024-39684

cve-icon Vulnrichment

Updated: 2024-09-05T08:03:37.023Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-09T19:15:12.700

Modified: 2024-07-11T13:06:13.187

Link: CVE-2024-39684

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-09T00:00:00Z

Links: CVE-2024-39684 - Bugzilla