nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
History

Thu, 13 Feb 2025 18:00:00 +0000

Type Values Removed Values Added
Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published:

Updated: 2025-02-13T17:52:19.574Z

Reserved: 2024-04-24T20:35:08.340Z

Link: CVE-2024-33599

cve-icon Vulnrichment

Updated: 2024-08-02T02:36:04.290Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-06T20:15:11.437

Modified: 2025-02-13T18:18:03.513

Link: CVE-2024-33599

cve-icon Redhat

Severity : Important

Publid Date: 2024-04-23T00:00:00Z

Links: CVE-2024-33599 - Bugzilla