CVE-2024-41881

SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.
Configurations

No configuration.

History

21 Nov 2024, 09:33

Type Values Removed Values Added
References () https://github.com/PhilipHazel/SDoP - () https://github.com/PhilipHazel/SDoP -
References () https://github.com/PhilipHazel/SDoP/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023 - () https://github.com/PhilipHazel/SDoP/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023 -
References () https://jvn.jp/en/jp/JVN16420523/ - () https://jvn.jp/en/jp/JVN16420523/ -

01 Aug 2024, 13:59

Type Values Removed Values Added
CWE CWE-121
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

29 Jul 2024, 14:12

Type Values Removed Values Added
Summary
  • (es) Las versiones SDoP anteriores a la 1.11 no manejan adecuadamente algunos parámetros dentro de los datos de entrada, lo que genera una vulnerabilidad de desbordamiento de búfer en la región stack de la memoria. Cuando se engaña a un usuario del producto afectado para que procese un archivo XML especialmente manipulado, se puede ejecutar código arbitrario en el entorno del usuario.

29 Jul 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 09:15

Updated : 2024-11-21 09:33


NVD link : CVE-2024-41881

Mitre link : CVE-2024-41881

CVE.ORG link : CVE-2024-41881


JSON object : View

Products Affected

No product.

CWE
CWE-121

Stack-based Buffer Overflow