CVE-2024-57823
Published: 10 January 2025
Summary
CVE-2024-57823 is a critical-severity Wrap or Wraparound (CWE-191) vulnerability in Librdf Raptor Rdf Syntax Library. Its CVSS base score is 9.3 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 12.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely remediation of flaws, directly preventing exploitation of the integer underflow in Raptor RDF library's URI normalization by applying vendor patches.
SI-10 enforces validation of inputs to the Turtle parser, reducing the risk of crafted URIs triggering the integer underflow during path normalization.
RA-5 mandates vulnerability scanning to identify systems using vulnerable versions of the Raptor RDF library affected by CVE-2024-57823.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Integer underflow in URI normalization and heap buffer overflow in parsers enable potential code execution via client-side exploitation (T1203) or application denial-of-service (T1499.004).
NVD Description
In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().
Deeper analysisAI
CVE-2024-57823 is an integer underflow vulnerability (CWE-191) affecting the Raptor RDF Syntax Library through version 2.0.16. The flaw occurs in the Turtle parser during URI normalization in the raptor_uri_normalize_path() function. It carries a CVSS v3.1 base score of 9.3 (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for severe impacts.
A local attacker can exploit this vulnerability with low attack complexity, requiring no privileges or user interaction. Exploitation changes the scope and can result in high confidentiality, integrity, and availability impacts, potentially allowing arbitrary code execution or system compromise on affected systems processing malicious Turtle input.
Advisories and related resources include a Debian bug report at https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067896, a GitHub issue tracking the problem at https://github.com/dajobe/raptor/issues/70, a fuzzing proof-of-concept at https://github.com/pedrib/PoC/blob/master/fuzzing/raptor-fuzz.md, and a Debian LTS announcement at https://lists.debian.org/debian-lts-announce/2025/10/msg00023.html, which provide details on patches and mitigations.
Details
- CWE(s)