2025-03-02 03:03:52 +00:00

82 lines
3.6 KiB
JSON

{
"id": "CVE-2024-52061",
"sourceIdentifier": "3f572a00-62e2-4423-959a-7ea25eff1638",
"published": "2024-12-13T11:15:08.457",
"lastModified": "2024-12-13T11:15:08.457",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Queuing Service, Recording Service, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45."
},
{
"lang": "es",
"value": "La vulnerabilidad de copia de b\u00fafer sin comprobar el tama\u00f1o de la entrada ('desbordamiento de b\u00fafer cl\u00e1sico') en RTI Connext Professional (librer\u00edas principales, servicio de cola, servicio de grabaci\u00f3n, servicio de enrutamiento) permite desbordamiento de variables y etiquetas. Este problema afecta a Connext Professional: desde la versi\u00f3n 7.4.0 hasta la 7.5.0, desde la versi\u00f3n 7.0.0 hasta la 7.3.0.5, desde la versi\u00f3n 6.1.0 hasta la 6.1.2.21, desde la versi\u00f3n 6.0.0 hasta la 6.0.1.40, desde la versi\u00f3n 5.0.0 hasta la 5.3.1.45."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "3f572a00-62e2-4423-959a-7ea25eff1638",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "3f572a00-62e2-4423-959a-7ea25eff1638",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://www.rti.com/vulnerabilities/#cve-2024-52061",
"source": "3f572a00-62e2-4423-959a-7ea25eff1638"
}
]
}