Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-33599

Опубликовано: 06 мая 2024
Источник: debian
EPSS Низкий

Описание

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.37-19package

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=31677

  • https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/

  • https://www.openwall.com/lists/oss-security/2024/04/24/2

  • https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005

  • Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=87801a8fd06db1d654eea3e4f7626ff476a9bdaa

EPSS

Процентиль: 61%
0.00426
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

CVSS3: 7.6
redhat
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

CVSS3: 8.1
nvd
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

CVSS3: 8.1
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.1
github
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

EPSS

Процентиль: 61%
0.00426
Низкий