24 lines
1022 B
JSON
Raw Normal View History

{
"id": "CVE-2024-33781",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-07T14:15:10.880",
"lastModified": "2024-05-07T20:07:58.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function octetStream::get_bytes in /Tools/octetStream.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n octetStream::get_bytes en /Tools/octetStream.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-octetStream",
"source": "cve@mitre.org"
}
]
}