Description
An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Published: 2024-10-03
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3911-1 libgsf security update
Debian DSA Debian DSA DSA-5786-1 libgsf security update
EUVD EUVD EUVD-2024-39610 An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Ubuntu USN Ubuntu USN USN-7062-1 libgsf vulnerabilities
Ubuntu USN Ubuntu USN USN-7062-2 libgsf vulnerabilities
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Fri, 22 Nov 2024 12:00:00 +0000


Fri, 04 Oct 2024 13:15:00 +0000

Type Values Removed Values Added
Title libgsf: Compound Document Binary File Sector Allocation Table integer overflow vulnerability
References
Metrics threat_severity

None

threat_severity

Important


Thu, 03 Oct 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Gnome
Gnome libgsf
CPEs cpe:2.3:a:gnome:libgsf:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:libgsf:1.14.52:*:*:*:*:*:*:*
Vendors & Products Gnome
Gnome libgsf
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 03 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
Description An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Weaknesses CWE-190
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-11-03T22:04:50.389Z

Reserved: 2024-08-23T16:07:08.799Z

Link: CVE-2024-42415

cve-icon Vulnrichment

Updated: 2025-11-03T22:04:50.389Z

cve-icon NVD

Status : Modified

Published: 2024-10-03T16:15:05.867

Modified: 2025-11-03T22:18:05.960

Link: CVE-2024-42415

cve-icon Redhat

Severity : Important

Publid Date: 2024-10-03T15:24:57Z

Links: CVE-2024-42415 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses