Vulnerability Details : CVE-2024-24259
Potential exploit
freeglut through 3.4.0 was discovered to contain a memory leak via the menuEntry variable in the glutAddMenuEntry function.
Products affected by CVE-2024-24259
- cpe:2.3:a:artifex:mupdf:1.23.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-24259
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-24259
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-05-15 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | 2024-02-07 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-24259 | 2024-02-13 |
CWE ids for CVE-2024-24259
-
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2024-24259
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IBAWX3HMMZVAWJZ3U6VOAYYOYJCN3IS/
[SECURITY] Fedora 38 Update: freeglut-3.4.0-7.fc38 - package-announce - Fedora Mailing-Lists
-
https://github.com/freeglut/freeglut/pull/155
Plug memory leak that happens upon error. by sebras · Pull Request #155 · freeglut/freeglut · GitHub
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T43DAHPIWMGN54E4I6ABLHNYHZSTX7H5/
[SECURITY] Fedora 39 Update: freeglut-3.4.0-7.fc39 - package-announce - Fedora Mailing-Lists
-
https://github.com/yinluming13579/mupdf_defects/blob/main/mupdf_detect_2.md
mupdf_defects/mupdf_detect_2.md at main · yinluming13579/mupdf_defects · GitHubExploit;Third Party Advisory
Jump to