nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. | nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. |

Status: PUBLISHED
Assigner: glibc
Published: 2024-05-06T19:21:54.314Z
Updated: 2025-02-13T17:52:19.574Z
Reserved: 2024-04-24T20:35:08.340Z
Link: CVE-2024-33599

Updated: 2024-08-02T02:36:04.290Z

Status : Awaiting Analysis
Published: 2024-05-06T20:15:11.437
Modified: 2025-02-13T18:18:03.513
Link: CVE-2024-33599
