We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-39684

Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Overflow



Description

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.

Reserved 2024-06-27 | Published 2024-07-09 | Updated 2024-09-05 | Assigner GitHub_M


MEDIUM: 6.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

<= 1.1.0
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684

cve.org (CVE-2024-39684)

nvd.nist.gov (CVE-2024-39684)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-39684

Support options

Helpdesk Chat, Email, Knowledgebase