nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
References
Configurations
No configuration.
History
26 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
13 Feb 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. |
Information
Published : 2024-05-06 20:15
Updated : 2025-03-26 21:15
NVD link : CVE-2024-33599
Mitre link : CVE-2024-33599
CVE.ORG link : CVE-2024-33599
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow