CVE-2024-52531

GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
mitreCNA
6.5 MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
CISA-ADPADP
8.4 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 27%
Debian logo
Debian Releases
Debian Product
Codename
libsoup2.4
bullseye
vulnerable
bookworm
2.74.3-1+deb12u1
no-dsa
bullseye (security)
2.72.0-2+deb11u2
fixed
sid
2.74.3-10.1
fixed
trixie
2.74.3-10.1
fixed
libsoup3
bookworm
no-dsa
sid
3.6.5-1
fixed
trixie
3.6.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libsoup2.4
plucky
Fixed 2.74.3-8ubuntu1
released
oracular
Fixed 2.74.3-7ubuntu0.1
released
noble
Fixed 2.74.3-6ubuntu1.1
released
jammy
Fixed 2.74.2-3ubuntu0.1
released
focal
Fixed 2.70.0-1ubuntu0.1
released
bionic
Fixed 2.62.1-1ubuntu0.4+esm1
released
xenial
needs-triage
libsoup3
plucky
not-affected
oracular
Fixed 3.6.0-2ubuntu0.1
released
noble
Fixed 3.4.4-5ubuntu0.1
released
jammy
Fixed 3.0.7-0ubuntu1+esm1
released
focal
dne