CVE-2024-53849: Several stack buffer overflows and pointer overflows in editorconfig-core-c

4.8 CVSS

Description

editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Classification

CVE ID: CVE-2024-53849

CVSS Base Severity: MEDIUM

CVSS Base Score: 4.8

Affected Products

Vendor: editorconfig

Product: editorconfig-core-c

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 17.81% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/editorconfig/editorconfig-core-c/security/advisories/GHSA-475j-wc37-6274
https://github.com/editorconfig/editorconfig-core-c/pull/103
https://github.com/editorconfig/editorconfig-core-c/commit/4d5518a0a4e4910c37281ab13a048d0d86999782
https://github.com/editorconfig/editorconfig-core-c/commit/a8dd5312e08abeab95ff5656d32ed3cb85fba70b
http://editorconfig.org

Timeline