nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
CVSS
No CVSS.
References
Configurations
No configuration.
History
21 Nov 2024, 09:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/07/22/5 - | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html - | |
References | () https://security.netapp.com/advisory/ntap-20240524-0011/ - | |
References | () https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 - |
22 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jun 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 May 2024, 13:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 May 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-06 20:15
Updated : 2024-11-21 09:17
NVD link : CVE-2024-33599
Mitre link : CVE-2024-33599
CVE.ORG link : CVE-2024-33599
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow