CVE-2024-36474

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36474
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36474.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-36474
Related
Published
2024-10-03T16:15:05Z
Modified
2024-10-12T11:27:42.622937Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

References

Affected packages

Debian:11 / libgsf

Package

Name
libgsf
Purl
pkg:deb/debian/libgsf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.47-1+deb11u1

Affected versions

1.*

1.14.47-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libgsf

Package

Name
libgsf
Purl
pkg:deb/debian/libgsf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.50-1+deb12u1

Affected versions

1.*

1.14.50-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libgsf

Package

Name
libgsf
Purl
pkg:deb/debian/libgsf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.52-1.1

Affected versions

1.*

1.14.50-1
1.14.51-1
1.14.51-2
1.14.52-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/gnome/libgsf

Affected ranges

Type
GIT
Repo
https://github.com/gnome/libgsf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

LIBGSF_1_10_0
LIBGSF_1_10_1
LIBGSF_1_11_0
LIBGSF_1_12_0
LIBGSF_1_12_1
LIBGSF_1_12_2
LIBGSF_1_12_3
LIBGSF_1_13_0
LIBGSF_1_13_1
LIBGSF_1_13_2
LIBGSF_1_13_3
LIBGSF_1_13_99
LIBGSF_1_14_0
LIBGSF_1_14_1
LIBGSF_1_14_10
LIBGSF_1_14_11
LIBGSF_1_14_12
LIBGSF_1_14_13
LIBGSF_1_14_14
LIBGSF_1_14_15
LIBGSF_1_14_16
LIBGSF_1_14_17
LIBGSF_1_14_18
LIBGSF_1_14_19
LIBGSF_1_14_2
LIBGSF_1_14_20
LIBGSF_1_14_21
LIBGSF_1_14_22
LIBGSF_1_14_23
LIBGSF_1_14_24
LIBGSF_1_14_25
LIBGSF_1_14_26
LIBGSF_1_14_27
LIBGSF_1_14_28
LIBGSF_1_14_29
LIBGSF_1_14_3
LIBGSF_1_14_30
LIBGSF_1_14_31
LIBGSF_1_14_32
LIBGSF_1_14_33
LIBGSF_1_14_34
LIBGSF_1_14_35
LIBGSF_1_14_36
LIBGSF_1_14_37
LIBGSF_1_14_38
LIBGSF_1_14_39
LIBGSF_1_14_4
LIBGSF_1_14_40
LIBGSF_1_14_41
LIBGSF_1_14_42
LIBGSF_1_14_43
LIBGSF_1_14_44
LIBGSF_1_14_45
LIBGSF_1_14_46
LIBGSF_1_14_47
LIBGSF_1_14_48
LIBGSF_1_14_49
LIBGSF_1_14_5
LIBGSF_1_14_50
LIBGSF_1_14_51
LIBGSF_1_14_52
LIBGSF_1_14_6
LIBGSF_1_14_7
LIBGSF_1_14_8
LIBGSF_1_14_9
LIBGSF_1_1_0
LIBGSF_1_2_0
LIBGSF_1_3_0
LIBGSF_1_4_0
LIBGSF_1_5_0
LIBGSF_1_6_0
LIBGSF_1_7_2
LIBGSF_1_8_0
LIBGSF_1_8_1
LIBGSF_1_8_2
LIBGSF_1_9_0
LIBGSF_1_9_1