CVE-2024-33602

nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
Configurations

No configuration.

History

22 Jul 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/22/5 -

03 Jul 2024, 01:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6

30 Jun 2024, 15:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html -

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240524-0012/ -

07 May 2024, 13:39

Type Values Removed Values Added
Summary
  • (es) nscd: la caché de netgroup supone que la devolución de llamada de NSS utiliza cadenas en el búfer La caché de netgroup del daemon de caché del servicio de nombres (nscd) puede dañar la memoria cuando la devolución de llamada de NSS no almacena todas las cadenas en el búfer proporcionado. La falla se introdujo en glibc 2.15 cuando se agregó el caché a nscd. Esta vulnerabilidad sólo está presente en el binario nscd.

06 May 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-06 20:15

Updated : 2024-07-22 18:15


NVD link : CVE-2024-33602

Mitre link : CVE-2024-33602

CVE.ORG link : CVE-2024-33602


JSON object : View

Products Affected

No product.

CWE
CWE-466

Return of Pointer Value Outside of Expected Range