Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Tencent
Tencent rapidjson |
|
References |
| |
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-09T18:53:53.855Z
Updated: 2024-09-05T08:03:37.023Z
Reserved: 2024-06-27T18:44:13.034Z
Link: CVE-2024-39684
Vulnrichment
Updated: 2024-09-05T08:03:37.023Z
NVD
Status : Awaiting Analysis
Published: 2024-07-09T19:15:12.700
Modified: 2024-07-11T13:06:13.187
Link: CVE-2024-39684
Redhat