Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34408: n/a

0
Medium
VulnerabilityCVE-2024-34408cvecve-2024-34408
Published: Fri May 03 2024 (05/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tencent libpag through 4.3.51 has an integer overflow in DecodeStream::checkEndOfFile() in codec/utils/DecodeStream.cpp via a crafted PAG (Portable Animated Graphics) file.

AI-Powered Analysis

AILast updated: 02/25/2026, 21:45:47 UTC

Technical Analysis

CVE-2024-34408 is a medium severity integer overflow vulnerability found in Tencent's libpag library, versions through 4.3.51. The vulnerability resides in the DecodeStream::checkEndOfFile() function within codec/utils/DecodeStream.cpp, which is responsible for processing PAG (Portable Animated Graphics) files. An attacker can craft a malicious PAG file that triggers an integer overflow during the decoding process. This overflow can lead to heap-based buffer overflow conditions (CWE-122), potentially causing memory corruption. The flaw requires the attacker to have local privileges (AV:L) and low complexity (AC:L) to exploit, with no user interaction needed (UI:N). The scope is unchanged (S:U), and exploitation can result in limited confidentiality, integrity, and availability impacts (C:L/I:L/A:L). No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor updates or workarounds. The vulnerability affects applications or systems that utilize libpag for rendering PAG files, which are used in multimedia and animation contexts, particularly in Tencent's ecosystem.

Potential Impact

If exploited, this vulnerability could allow an attacker with local access to cause memory corruption, potentially leading to application crashes, denial of service, or limited unauthorized data access or modification. While the impact on confidentiality, integrity, and availability is rated as low to moderate, the risk is significant for systems that process untrusted PAG files, especially in environments where local users or processes can supply such files. This could affect multimedia applications, content creation tools, or any software relying on libpag for animated graphics rendering. The absence of known exploits reduces immediate risk, but the presence of a heap-based buffer overflow makes it a candidate for future exploitation attempts. Organizations relying on Tencent's libpag should consider the potential for disruption or data compromise in their threat models.

Mitigation Recommendations

To mitigate this vulnerability, organizations should monitor for official patches or updates from Tencent and apply them promptly once available. In the meantime, restrict local user permissions to prevent untrusted users from supplying or processing PAG files. Implement input validation and sandboxing around any components that handle PAG files to limit the impact of potential exploitation. Employ runtime protections such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and heap protection mechanisms to reduce the likelihood of successful exploitation. Additionally, audit and monitor systems for unusual crashes or behaviors related to multimedia processing. If possible, disable or limit the use of PAG file processing in environments where it is not essential.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4fb7ef31ef0b562284

Added to database: 2/25/2026, 9:40:31 PM

Last enriched: 2/25/2026, 9:45:47 PM

Last updated: 2/26/2026, 8:02:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats