SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.
[
{
"signature_version": "v1",
"source": "https://github.com/philiphazel/sdop/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023",
"digest": {
"threshold": 0.9,
"line_hashes": [
"44366119603529677169454812701320698407",
"338176924148442339469863851979902316209",
"233060403548292538380620315969888323756",
"117688591773325953546080897541979501317",
"204244192756256429343857058216401163350",
"218021249779216818121455820421139147446"
]
},
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "src/read.c"
},
"id": "CVE-2024-41881-e06f14a9"
}
]