CVE-2024-41881

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41881
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41881.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41881
Downstream
Published
2024-07-29T09:15:02Z
Modified
2025-10-17T08:22:10.222034Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.

References

Affected packages

Git / github.com/philiphazel/sdop

Affected ranges

Type
GIT
Repo
https://github.com/philiphazel/sdop
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

sdop-1.*

sdop-1.00
sdop-1.10

Database specific

vanir_signatures

[
    {
        "signature_version": "v1",
        "source": "https://github.com/philiphazel/sdop/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "44366119603529677169454812701320698407",
                "338176924148442339469863851979902316209",
                "233060403548292538380620315969888323756",
                "117688591773325953546080897541979501317",
                "204244192756256429343857058216401163350",
                "218021249779216818121455820421139147446"
            ]
        },
        "signature_type": "Line",
        "deprecated": false,
        "target": {
            "file": "src/read.c"
        },
        "id": "CVE-2024-41881-e06f14a9"
    }
]