In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows.
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 17:45:00 +0000

Type Values Removed Values Added
Description In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows. In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows.
Title Integer wraparound, under-allocation, and heap buffer overflow in Eclipse ThreadX NetX Duo __portable_aligned_alloc() Integer wraparound, under-allocation, and heap buffer overflow in Eclipse ThreadX NetX Duo __portable_aligned_alloc()

Thu, 06 Feb 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Eclipse
Eclipse threadx Netx Duo
CPEs cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
Vendors & Products Eclipse
Eclipse threadx Netx Duo

cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2025-02-13T17:40:10.101Z

Reserved: 2024-03-14T14:48:55.832Z

Link: CVE-2024-2452

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.580Z

cve-icon NVD

Status : Modified

Published: 2024-03-26T16:15:13.623

Modified: 2025-02-13T18:17:53.980

Link: CVE-2024-2452

cve-icon Redhat

No data.