libmodbus v3.1.6 was discovered to contain a use-after-free via the ctx->backend pointer. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server.
References
| Link | Resource |
|---|---|
| https://github.com/stephane/libmodbus/issues/749 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/stephane/libmodbus/issues/749 | Exploit Issue Tracking Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/03/msg00010.html |
Configurations
History
03 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 May 2025, 13:50
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Libmodbus
Libmodbus libmodbus |
|
| References | () https://github.com/stephane/libmodbus/issues/749 - Exploit, Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:a:libmodbus:libmodbus:3.1.6:*:*:*:*:*:*:* |
Information
Published : 2024-05-31 20:15
Updated : 2025-11-03 21:16
NVD link : CVE-2024-36844
Mitre link : CVE-2024-36844
CVE.ORG link : CVE-2024-36844
JSON object : View
Products Affected
libmodbus
- libmodbus
CWE
CWE-416
Use After Free
