Skip to main content

CVE-2024-52035: CWE-190: Integer Overflow or Wraparound in catdoc catdoc

High
VulnerabilityCVE-2024-52035cvecve-2024-52035cwe-190
Published: Mon Jun 02 2025 (06/02/2025, 15:00:17 UTC)
Source: CVE Database V5
Vendor/Project: catdoc
Product: catdoc

Description

An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 07/03/2025, 15:54:51 UTC

Technical Analysis

CVE-2024-52035 is a high-severity integer overflow vulnerability identified in version 0.95 of catdoc, a utility used to extract text from Microsoft Office documents. The flaw exists specifically within the OLE Document File Allocation Table (FAT) parser component of catdoc. An integer overflow or wraparound occurs when processing specially crafted malformed OLE files, leading to heap-based memory corruption. This memory corruption can be exploited by an attacker who supplies a maliciously crafted file to the vulnerable catdoc parser, potentially resulting in arbitrary code execution, denial of service, or other impacts on confidentiality, integrity, and availability. The vulnerability does not require user interaction or privileges to exploit, but local access to the vulnerable software is necessary (CVSS vector: AV:L/AC:L/PR:N/UI:N). The CVSS score of 8.4 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity. Although no known exploits have been reported in the wild yet, the nature of the vulnerability and the widespread use of catdoc in various Linux distributions and document processing pipelines make it a significant risk. The lack of an available patch at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on catdoc for document processing, text extraction, or automated workflows involving legacy Microsoft Office documents. Exploitation could allow attackers to execute arbitrary code or cause denial of service on systems processing untrusted documents, potentially leading to data breaches, disruption of services, or lateral movement within networks. Sectors such as government, finance, legal, and critical infrastructure that handle large volumes of document files and may use catdoc in backend systems or security appliances are particularly at risk. The vulnerability's ability to compromise confidentiality, integrity, and availability simultaneously elevates the threat to sensitive data and operational continuity. Furthermore, since catdoc is often used in open-source environments and Linux-based systems, organizations with such infrastructure in Europe must be vigilant. The absence of known exploits currently provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting or disabling the use of catdoc 0.95 in environments where untrusted documents are processed. Employ strict input validation and sandboxing techniques to isolate document parsing processes, minimizing the impact of potential exploitation. Monitoring and logging document processing activities can help detect anomalous behavior indicative of exploitation attempts. Organizations should also consider replacing catdoc with alternative, actively maintained tools that do not exhibit this vulnerability. Network segmentation and least privilege principles should be enforced to limit the reach of any compromise. Additionally, organizations should stay alert for vendor updates or patches and apply them promptly once available. Conducting internal audits to identify all instances of catdoc usage will ensure comprehensive mitigation coverage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2024-12-12T17:10:33.953Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae249835e

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 3:54:51 PM

Last updated: 7/30/2025, 4:12:07 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats