CVE-2024-52338

Severity
9.8CRITICAL
EPSS
1.4%
top 19.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 28

Description

Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that emb

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDapache/arrow4.0.017.0.0
PyPIpyarrow4.0.017.0.0+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-m5xw-hwxw-fq3j: Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 42024-11-28
CVEList
Apache Arrow R package: Arbitrary code execution when loading a malicious data file2024-11-28
OSV
CVE-2024-52338: Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 42024-11-28

📋Vendor Advisories

1
Microsoft
Apache Arrow R package: Arbitrary code execution when loading a malicious data file2024-11-12
CVE-2024-52338 (CRITICAL CVSS 9.8) | Deserialization of untrusted data i | cvebase.io