Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-40897
HistoryJul 26, 2024 - 6:15 a.m.

CVE-2024-40897

2024-07-2606:15:02
Debian Security Bug Tracker
security-tracker.debian.org
5
cve-2024-40897
orc unix
buffer overflow

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

5.0%

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer’s build environment. This may lead to compromise of developer machines or CI build environments.

OSVersionArchitecturePackageVersionFilename
Debian12allorc<= 1:0.4.33-2orc_1:0.4.33-2_all.deb
Debian11allorc<= 1:0.4.32-1orc_1:0.4.32-1_all.deb
Debian999allorc< 1:0.4.39-1orc_1:0.4.39-1_all.deb
Debian13allorc< 1:0.4.39-1orc_1:0.4.39-1_all.deb

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

5.0%