An integer overflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/ | Mailing List |
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1921 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/ | Mailing List |
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1921 | Exploit Third Party Advisory |
Configurations
History
21 Jan 2025, 18:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:libbiosig_project:libbiosig:2.5.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* |
|
First Time |
Libbiosig Project
Fedoraproject Libbiosig Project libbiosig Fedoraproject fedora |
|
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/ - Mailing List | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1921 - Exploit, Third Party Advisory |
Information
Published : 2024-02-20 16:15
Updated : 2025-01-21 18:34
NVD link : CVE-2024-21812
Mitre link : CVE-2024-21812
CVE.ORG link : CVE-2024-21812
JSON object : View
Products Affected
libbiosig_project
- libbiosig
fedoraproject
- fedora
CWE
CWE-190
Integer Overflow or Wraparound