Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3911-1 | libgsf security update |
Debian DSA |
DSA-5786-1 | libgsf security update |
EUVD |
EUVD-2024-36111 | An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Ubuntu USN |
USN-7062-1 | libgsf vulnerabilities |
Ubuntu USN |
USN-7062-2 | libgsf vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 04 Oct 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | libgsf: Compound Document Binary File Directory integer overflow vulnerability | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 03 Oct 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnome
Gnome libgsf |
|
| CPEs | cpe:2.3:a:gnome:libgsf:*:*:*:*:*:*:*:* cpe:2.3:a:gnome:libgsf:1.14.52:*:*:*:*:*:*:* |
|
| Vendors & Products |
Gnome
Gnome libgsf |
|
| Metrics |
ssvc
|
Thu, 03 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-03T21:55:16.222Z
Reserved: 2024-08-23T16:04:24.689Z
Link: CVE-2024-36474
Updated: 2025-11-03T21:55:16.222Z
Status : Modified
Published: 2024-10-03T16:15:05.010
Modified: 2025-11-03T22:16:58.467
Link: CVE-2024-36474
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN