CVE-2024-33599

high

Description

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

References

https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005

https://security.netapp.com/advisory/ntap-20240524-0011/

https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html

http://www.openwall.com/lists/oss-security/2024/07/22/5

Details

Source: Mitre, NVD

Published: 2024-05-06

Updated: 2024-07-22

Risk Information

CVSS v2

Base Score: 8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:C

Severity: High

CVSS v3

Base Score: 7.6

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

Severity: High