Buffer Overflow Vulnerability in GNOME libsoup Affecting Open Source Applications
CVE-2024-52531
6.5MEDIUM
Summary
A buffer overflow vulnerability exists in GNOME libsoup before version 3.6.1, specifically in the 'soup_header_parse_param_list_strict' function. This vulnerability can be exploited in applications that perform character encoding conversions to UTF-8. While the overflow is initiated through network input, it cannot trigger this specific vulnerability, highlighting a potential security risk in handling encoded headers. Application developers using affected versions should implement appropriate security measures and upgrade to the latest version to mitigate this risk.
Affected Version(s)
libsoup 0 < 3.6.1
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published