Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34408: n/a

0
Medium
VulnerabilityCVE-2024-34408cvecve-2024-34408
Published: Fri May 03 2024 (05/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tencent libpag through 4.3.51 has an integer overflow in DecodeStream::checkEndOfFile() in codec/utils/DecodeStream.cpp via a crafted PAG (Portable Animated Graphics) file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 23:17:17 UTC

Technical Analysis

CVE-2024-34408 is an integer overflow vulnerability identified in Tencent's libpag library, a multimedia framework used for rendering Portable Animated Graphics (PAG) files. The flaw exists in the DecodeStream::checkEndOfFile() function located in codec/utils/DecodeStream.cpp. An integer overflow occurs when the function processes a crafted PAG file, causing the internal integer value to wrap around unexpectedly. This can lead to memory corruption, potentially allowing an attacker to manipulate program execution flow or cause denial of service through application crashes. The vulnerability requires local privileges (AV:L) and low attack complexity (AC:L), with no user interaction (UI:N) necessary. The scope is unchanged (S:U), and the impact affects confidentiality, integrity, and availability at a low level (C:L/I:L/A:L). While no known exploits are currently reported, the vulnerability poses a risk to applications using libpag up to version 4.3.51. The weakness is classified under CWE-122 (Heap-based Buffer Overflow), indicating that the integer overflow may lead to buffer overflow conditions. No patches or mitigations have been officially released as of the publication date (May 3, 2024).

Potential Impact

The potential impact of CVE-2024-34408 includes memory corruption that could lead to application crashes or unexpected behavior, affecting the availability and integrity of affected systems. Confidentiality impact is limited but possible if an attacker leverages the overflow to execute arbitrary code or read sensitive memory areas. Since exploitation requires local privileges, the threat is more relevant in environments where untrusted PAG files are processed by privileged or semi-privileged users. The medium CVSS score reflects moderate risk, with limited scope for remote exploitation. Organizations relying on libpag for multimedia rendering or animation processing may experience service disruptions or data integrity issues if exploited. Although no active exploits are reported, the vulnerability could be targeted in the future, especially in software ecosystems heavily dependent on Tencent's multimedia libraries.

Mitigation Recommendations

To mitigate CVE-2024-34408, organizations should: 1) Avoid processing PAG files from untrusted or unauthenticated sources until patches are available. 2) Implement strict input validation and sanitization for PAG files to detect malformed or suspicious content. 3) Employ sandboxing or containerization techniques to isolate the libpag processing environment, limiting the impact of potential exploitation. 4) Monitor application logs and system behavior for anomalies such as crashes or memory errors related to PAG file handling. 5) Engage with Tencent or relevant software vendors to obtain updates or patches as soon as they are released. 6) Conduct code reviews and static analysis on any custom integrations of libpag to identify and remediate similar integer overflow risks. 7) Limit local user privileges to reduce the risk of exploitation by unprivileged users. These targeted measures go beyond generic advice by focusing on the specific nature of the vulnerability and its exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4fb7ef31ef0b562284

Added to database: 2/25/2026, 9:40:31 PM

Last enriched: 3/4/2026, 11:17:17 PM

Last updated: 4/12/2026, 3:42:11 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses