32 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-33599",
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"published": "2024-05-06T20:15:11.437",
"lastModified": "2024-05-06T20:15:11.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "nscd: Stack-based buffer overflow in netgroup cache\n\nIf the Name Service Cache Daemon's (nscd) fixed size cache is exhausted\nby client requests then a subsequent client request for netgroup data\nmay result in a stack-based buffer overflow. This flaw was introduced\nin glibc 2.15 when the cache was added to nscd.\n\nThis vulnerability is only present in the nscd binary.\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005",
"source": "3ff69d7a-14f2-4f67-a097-88dee7810d18"
}
]
}