CVE-2024-48877

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-48877
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-48877.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-48877
Downstream
Related
Published
2025-06-02T15:15:32Z
Modified
2025-07-01T16:09:11.760661Z
Summary
[none]
Details

A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

References

Affected packages

Debian:11 / catdoc

Package

Name
catdoc
Purl
pkg:deb/debian/catdoc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.95-4.1+deb11u1

Affected versions

1:0.*

1:0.95-4.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / catdoc

Package

Name
catdoc
Purl
pkg:deb/debian/catdoc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.95-6~deb12u1

Affected versions

1:0.*

1:0.95-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / catdoc

Package

Name
catdoc
Purl
pkg:deb/debian/catdoc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.95-6

Affected versions

1:0.*

1:0.95-5
1:0.95-6~deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}