An integer underflow during deserialization may allow any unauthenticated user to read out of bounds heap memory. This may result into secret data or pointers revealing the layout of the address space to be included into a deserialized data structure, which may potentially lead to thread crashes or cause denial of service conditions.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 12 Mar 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An integer underflow during deserialization may allow any unauthenticated user to read out of bounds heap memory. This may result into secret data or pointers revealing the layout of the address space to be included into a deserialized data structure, which may potentially lead to thread crashes or cause denial of service conditions. | |
Title | Integer Underflow in DDS_Security_Deserialize_ methods may lead to OOB read | |
Weaknesses | CWE-191 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-03-12T13:34:12.621Z
Reserved: 2024-11-05T05:23:32.317Z
Link: CVE-2024-10838

Updated: 2025-03-12T13:34:07.820Z

Status : Received
Published: 2025-03-12T13:15:36.060
Modified: 2025-03-12T13:15:36.060
Link: CVE-2024-10838

No data.