Lucene search

K
cveJpcertCVE-2024-40897
HistoryJul 26, 2024 - 6:15 a.m.

CVE-2024-40897

2024-07-2606:15:02
CWE-787
CWE-121
jpcert
web.nvd.nist.gov
51
buffer overflow
orc compiler
arbitrary code
developer machines
compromise
ci build environments

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

5.0%

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer’s build environment. This may lead to compromise of developer machines or CI build environments.

Affected configurations

Nvd
Vulners
Node
gstreamerorcRange<0.4.39
VendorProductVersionCPE
gstreamerorc*cpe:2.3:a:gstreamer:orc:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "GStreamer",
    "product": "ORC",
    "versions": [
      {
        "version": "prior to 0.4.39",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

5.0%