Sploit.io - Search

Product: G Structured File Library (libgsf), version: 1.14.52

CVE-2024-36474

Severity: HIGH

Description: An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS Score: 8.4

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000530000
  • Percentile: 0.237970000
  • Date: 2025-01-11

ExploitDB

No data available.

HackerOne Data

  • Rank: 7450
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • GNOME Project G Structured File Library (libgsf) - Versions: 1.14.52

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-36474 is an integer overflow issue in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version 1.14.52. This flaw allows an attacker to craft a malicious file that triggers an integer overflow, leading to an out-of-bounds index when reading or writing to an array. This can result in arbitrary code execution, posing a significant risk to systems utilizing this library.

    The CVSS v3.1 base score of 8.4 (HIGH) reflects the severity of this vulnerability. The attack vector is local (AV:L), meaning the attacker must have access to the local system, but no privileges are required (PR:N), and no user interaction is needed (UI:N). The impacts are severe, with high confidentiality (C:H), integrity (I:H), and availability (A:H) risks. Exploitation of this vulnerability could lead to complete system compromise, data exfiltration, or disruption of services.

    The likelihood of exploitation is moderate. While the attack complexity is low (AC:L), the requirement for local access may limit widespread exploitation. However, in environments where untrusted files are processed, the risk increases significantly. The EPSS score of 0.000530000 suggests a relatively low probability of exploitation in the wild, but this should not be interpreted as a reason to delay mitigation efforts.

    2. Potential Attack Scenarios
    An attacker could exploit this vulnerability by delivering a specially crafted Compound Document Binary File to a target system. For example, an employee in an organization might receive a malicious file via email or a compromised file-sharing service. When the file is opened or processed by an application that relies on the vulnerable libgsf library, the integer overflow is triggered.

    The attack process would involve the following steps:
    - The attacker creates a malicious file designed to exploit the integer overflow vulnerability.
    - The file is delivered to the target, either through phishing, social engineering, or by compromising a trusted file repository.
    - The target opens or processes the file using an application that utilizes the vulnerable libgsf library.
    - The integer overflow occurs, leading to an out-of-bounds memory access and potentially allowing the attacker to execute arbitrary code on the system.

    The potential outcomes include full system compromise, unauthorized access to sensitive data, and disruption of critical services. In a worst-case scenario, the attacker could use this vulnerability to establish persistence, move laterally within the network, or deploy additional malicious payloads.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. Organizations should:
    - Apply the latest patches or updates to the libgsf library as soon as they become available. Monitor the GNOME Project's official channels for updates.
    - If patching is not immediately possible, consider disabling or restricting the use of applications that rely on the vulnerable library until a fix is applied.
    - Implement strict file-handling policies to prevent the processing of untrusted or unknown files.
    - Use endpoint detection and response (EDR) solutions to monitor for suspicious file activity or attempts to exploit this vulnerability.
    - Educate employees about the risks of opening files from untrusted sources and encourage the use of secure file-sharing practices.

    Relevant resources for further information include:
    - GNOME Project issue tracker: https://gitlab.gnome.org/GNOME/libgsf/-/issues/34
    - Cisco Talos vulnerability report: https://talosintelligence.com/vulnerability_reports/TALOS-2024-2068

    4. Executive Summary
    CVE-2024-36474 is a high-severity vulnerability in the GNOME Project's G Structured File Library (libgsf) that could allow attackers to execute arbitrary code on affected systems. This flaw arises from an integer overflow issue when processing specially crafted files, potentially leading to system compromise, data breaches, or service disruptions.

    The risk is particularly significant in environments where untrusted files are processed, such as those involving email attachments or file-sharing services. While the likelihood of widespread exploitation is currently low, the potential impact is severe, making it critical to address this vulnerability promptly.

    Organizations should prioritize patching affected systems, restrict the use of vulnerable applications, and implement robust file-handling policies to mitigate the risk. Proactive monitoring and employee awareness are also essential to reduce the likelihood of successful exploitation. Addressing this vulnerability is crucial to maintaining the security and integrity of systems and data.

    CVE-2024-42415

    Severity: HIGH

    Description: An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

    CVSS Score: 8.4

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.000530000
    • Percentile: 0.238410000
    • Date: 2025-01-14

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 7454
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • GNOME Project G Structured File Library (libgsf) - Versions: 1.14.52

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability identified as CVE-2024-42415 is a high-severity issue with a CVSS score of 8.4. It resides in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version 1.14.52. The flaw is an integer overflow that leads to a heap-based buffer overflow when processing the sector allocation table. This can result in arbitrary code execution, allowing an attacker to take full control of the affected system.

      The nature of this vulnerability makes it particularly dangerous as it can be exploited without user interaction or elevated privileges. The attack vector is local, meaning the attacker must have some level of access to the system, but the low complexity of the attack increases the likelihood of exploitation. The impacts are severe, with high risks to confidentiality, integrity, and availability. Sensitive data could be exposed, systems could be compromised, and services could be disrupted.

      Given the ease of exploitation and the potential for arbitrary code execution, this vulnerability poses a significant risk to organizations using the affected version of libgsf. The business impact could include data breaches, operational downtime, and reputational damage.

      2. Potential Attack Scenarios
      An attacker could exploit this vulnerability by crafting a malicious Compound Document Binary File and delivering it to a target system. For example, the attacker could embed the malicious file in an email attachment or host it on a compromised website. When the victim opens the file using an application that relies on the vulnerable version of libgsf, the integer overflow is triggered during the parsing of the sector allocation table.

      The heap-based buffer overflow that follows could allow the attacker to execute arbitrary code within the context of the application processing the file. This could lead to full system compromise, enabling the attacker to steal sensitive data, install malware, or pivot to other systems within the network. The attack process is straightforward, requiring minimal technical skill, and the lack of user interaction makes it difficult for victims to detect or prevent the exploit.

      3. Mitigation Recommendations
      The most effective mitigation is to apply the latest patch or update to libgsf as soon as it becomes available. Organizations should monitor the GNOME Project's official channels, such as their GitLab repository, for updates and security advisories. Until a patch is available, consider disabling or restricting the use of applications that rely on the vulnerable version of libgsf.

      Implementing strict file handling policies can also reduce the risk. For example, block or quarantine files with unknown or untrusted origins, and use application whitelisting to prevent unauthorized software from executing. Additionally, network segmentation and endpoint detection and response (EDR) solutions can help contain and detect potential exploitation attempts.

      For further guidance, refer to the following resources:
      - GNOME Project GitLab Issue: https://gitlab.gnome.org/GNOME/libgsf/-/issues/34
      - Talos Intelligence Vulnerability Report: https://talosintelligence.com/vulnerability_reports/TALOS-2024-2069

      4. Executive Summary
      CVE-2024-42415 is a critical vulnerability in the GNOME Project's G Structured File Library (libgsf) that allows attackers to execute arbitrary code on affected systems. With a high CVSS score of 8.4, this flaw poses significant risks to data confidentiality, system integrity, and service availability. Attackers can exploit this vulnerability by delivering a malicious file, leading to potential data breaches, malware installation, and operational disruptions.

      The vulnerability is easy to exploit and does not require user interaction, making it a high-priority issue for organizations using the affected software. Immediate action is recommended, including applying patches as soon as they are available and implementing strict file handling policies. Failure to address this vulnerability could result in severe business impacts, including financial losses and reputational damage. Organizations should prioritize mitigation efforts to protect their systems and data from potential exploitation.