{"id":"CVE-2024-36474","details":"An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","modified":"2026-04-16T00:02:31.694018493Z","published":"2024-10-03T16:15:05.010Z","related":["SUSE-SU-2024:3770-1","SUSE-SU-2024:3920-1","SUSE-SU-2024:3921-1","SUSE-SU-2024:3922-1","USN-7062-2"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00002.html"},{"type":"WEB","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2068"},{"type":"ADVISORY","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-2068"},{"type":"REPORT","url":"https://gitlab.gnome.org/GNOME/libgsf/-/issues/34"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnome/libgsf","events":[{"introduced":"0"},{"last_affected":"ea9d8cd1369661bf62d0476474700a9e0887c812"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.14.52"}]}}],"versions":["LIBGSF_1_10_0","LIBGSF_1_10_1","LIBGSF_1_11_0","LIBGSF_1_12_0","LIBGSF_1_12_1","LIBGSF_1_12_2","LIBGSF_1_12_3","LIBGSF_1_13_0","LIBGSF_1_13_1","LIBGSF_1_13_2","LIBGSF_1_13_3","LIBGSF_1_13_99","LIBGSF_1_14_0","LIBGSF_1_14_1","LIBGSF_1_14_10","LIBGSF_1_14_11","LIBGSF_1_14_12","LIBGSF_1_14_13","LIBGSF_1_14_14","LIBGSF_1_14_15","LIBGSF_1_14_16","LIBGSF_1_14_17","LIBGSF_1_14_18","LIBGSF_1_14_19","LIBGSF_1_14_2","LIBGSF_1_14_20","LIBGSF_1_14_21","LIBGSF_1_14_22","LIBGSF_1_14_23","LIBGSF_1_14_24","LIBGSF_1_14_25","LIBGSF_1_14_26","LIBGSF_1_14_27","LIBGSF_1_14_28","LIBGSF_1_14_29","LIBGSF_1_14_3","LIBGSF_1_14_30","LIBGSF_1_14_31","LIBGSF_1_14_32","LIBGSF_1_14_33","LIBGSF_1_14_34","LIBGSF_1_14_35","LIBGSF_1_14_36","LIBGSF_1_14_37","LIBGSF_1_14_38","LIBGSF_1_14_39","LIBGSF_1_14_4","LIBGSF_1_14_40","LIBGSF_1_14_41","LIBGSF_1_14_42","LIBGSF_1_14_43","LIBGSF_1_14_44","LIBGSF_1_14_45","LIBGSF_1_14_46","LIBGSF_1_14_47","LIBGSF_1_14_48","LIBGSF_1_14_49","LIBGSF_1_14_5","LIBGSF_1_14_50","LIBGSF_1_14_51","LIBGSF_1_14_52","LIBGSF_1_14_6","LIBGSF_1_14_7","LIBGSF_1_14_8","LIBGSF_1_14_9","LIBGSF_1_1_0","LIBGSF_1_2_0","LIBGSF_1_3_0","LIBGSF_1_4_0","LIBGSF_1_5_0","LIBGSF_1_6_0","LIBGSF_1_7_2","LIBGSF_1_8_0","LIBGSF_1_8_1","LIBGSF_1_8_2","LIBGSF_1_9_0","LIBGSF_1_9_1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36474.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}