Vulnerability Details : CVE-2024-33599
nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Vulnerability category: Overflow
Products affected by CVE-2024-33599
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-33599
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-33599
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-03-26 |
CWE ids for CVE-2024-33599
-
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- 3ff69d7a-14f2-4f67-a097-88dee7810d18 (Secondary)
References for CVE-2024-33599
-
https://security.netapp.com/advisory/ntap-20240524-0011/
CVE-2024-33599 GNU C Library (glibc) Vulnerability in NetApp Products | NetApp Product Security
-
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
sourceware.org Git - glibc.git/blob - advisories/GLIBC-SA-2024-0005
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
[SECURITY] [DLA 3850-1] glibc security update
-
http://www.openwall.com/lists/oss-security/2024/07/22/5
oss-security - GNU C Library version 2.40 released with 5 CVE fixes
Jump to