{"id":"CVE-2024-42415","details":"An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.","modified":"2026-05-15T11:54:43.876534864Z","published":"2024-10-03T15:24:57.874Z","related":["SUSE-SU-2024:3770-1","SUSE-SU-2024:3920-1","SUSE-SU-2024:3921-1","SUSE-SU-2024:3922-1","USN-7062-2"],"database_specific":{"cna_assigner":"talos","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42415.json","cwe_ids":["CWE-190"]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/10/04/3"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00002.html"},{"type":"WEB","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-2069"},{"type":"WEB","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2069"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42415.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42415"},{"type":"REPORT","url":"https://gitlab.gnome.org/GNOME/libgsf/-/issues/34"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}