{ "id": "CVE-2024-33781", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.880", "lastModified": "2024-05-07T20:07:58.737", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MP-SPDZ v0.3.8 was discovered to contain a stack overflow via the function octetStream::get_bytes in /Tools/octetStream.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message." }, { "lang": "es", "value": "Se descubri\u00f3 que MP-SPDZ v0.3.8 conten\u00eda un desbordamiento de pila mediante la funci\u00f3n octetStream::get_bytes en /Tools/octetStream.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado." } ], "metrics": {}, "references": [ { "url": "https://github.com/FudanMPL/Vulnerabilities-in-MPC-Framework/tree/main/MP-SPDZ/stack-buffer-overflow-octetStream", "source": "cve@mitre.org" } ] }