Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-33599

Опубликовано: 06 мая 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.1

Описание

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

trusty/esm

ignored

end of ESM support, was needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

2.40-4ubuntu1
esm-infra/bionic

released

2.27-3ubuntu1.6+esm3
esm-infra/focal

not-affected

2.31-0ubuntu9.16
esm-infra/xenial

released

2.23-0ubuntu11.3+esm7
focal

released

2.31-0ubuntu9.16
jammy

released

2.35-0ubuntu3.8
mantic

released

2.38-1ubuntu6.3
noble

released

2.39-0ubuntu8.2
oracular

not-affected

2.40-1ubuntu3
plucky

not-affected

2.40-4ubuntu1

Показывать по

EPSS

Процентиль: 61%
0.00426
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.6
redhat
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

CVSS3: 8.1
nvd
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

CVSS3: 8.1
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.1
debian
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Servi ...

CVSS3: 8.1
github
около 1 года назад

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

EPSS

Процентиль: 61%
0.00426
Низкий

8.1 High

CVSS3