Vulnerability Details : CVE-2024-33600
nscd: Null pointer crashes after notfound response
If the Name Service Cache Daemon's (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference. This flaw was introduced in glibc 2.15 when the
cache was added to nscd.
This vulnerability is only present in the nscd binary.
Vulnerability category: Memory Corruption
Products affected by CVE-2024-33600
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-33600
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-33600
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-03-27 |
CWE ids for CVE-2024-33600
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: 3ff69d7a-14f2-4f67-a097-88dee7810d18 (Secondary)
References for CVE-2024-33600
-
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
sourceware.org Git - glibc.git/blob - advisories/GLIBC-SA-2024-0006
-
https://security.netapp.com/advisory/ntap-20240524-0013/
CVE-2024-33600 GNU C Library (glibc) Vulnerability in NetApp Products | NetApp Product Security
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
[SECURITY] [DLA 3850-1] glibc security update
-
http://www.openwall.com/lists/oss-security/2024/07/22/5
oss-security - GNU C Library version 2.40 released with 5 CVE fixes
Jump to