Vulnerability Details CVE-2024-40897
Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 9.7%
CVSS Severity
CVSS v3 Score 6.7
Products affected by CVE-2024-40897
-
cpe:2.3:a:gstreamer:orc:-
-
cpe:2.3:a:gstreamer:orc:0.4.0
-
cpe:2.3:a:gstreamer:orc:0.4.1
-
cpe:2.3:a:gstreamer:orc:0.4.10
-
cpe:2.3:a:gstreamer:orc:0.4.11
-
cpe:2.3:a:gstreamer:orc:0.4.12
-
cpe:2.3:a:gstreamer:orc:0.4.13
-
cpe:2.3:a:gstreamer:orc:0.4.14
-
cpe:2.3:a:gstreamer:orc:0.4.15
-
cpe:2.3:a:gstreamer:orc:0.4.16
-
cpe:2.3:a:gstreamer:orc:0.4.17
-
cpe:2.3:a:gstreamer:orc:0.4.18
-
cpe:2.3:a:gstreamer:orc:0.4.19
-
cpe:2.3:a:gstreamer:orc:0.4.2
-
cpe:2.3:a:gstreamer:orc:0.4.20
-
cpe:2.3:a:gstreamer:orc:0.4.21
-
cpe:2.3:a:gstreamer:orc:0.4.22
-
cpe:2.3:a:gstreamer:orc:0.4.23
-
cpe:2.3:a:gstreamer:orc:0.4.24
-
cpe:2.3:a:gstreamer:orc:0.4.25
-
cpe:2.3:a:gstreamer:orc:0.4.26
-
cpe:2.3:a:gstreamer:orc:0.4.27
-
cpe:2.3:a:gstreamer:orc:0.4.28
-
cpe:2.3:a:gstreamer:orc:0.4.29
-
cpe:2.3:a:gstreamer:orc:0.4.3
-
cpe:2.3:a:gstreamer:orc:0.4.30
-
cpe:2.3:a:gstreamer:orc:0.4.31
-
cpe:2.3:a:gstreamer:orc:0.4.32
-
cpe:2.3:a:gstreamer:orc:0.4.33
-
cpe:2.3:a:gstreamer:orc:0.4.34
-
cpe:2.3:a:gstreamer:orc:0.4.35
-
cpe:2.3:a:gstreamer:orc:0.4.36
-
cpe:2.3:a:gstreamer:orc:0.4.37
-
cpe:2.3:a:gstreamer:orc:0.4.38
-
cpe:2.3:a:gstreamer:orc:0.4.4
-
cpe:2.3:a:gstreamer:orc:0.4.5
-
cpe:2.3:a:gstreamer:orc:0.4.6
-
cpe:2.3:a:gstreamer:orc:0.4.7
-
cpe:2.3:a:gstreamer:orc:0.4.8
-
cpe:2.3:a:gstreamer:orc:0.4.9