Description
nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
Published: 2024-05-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3850-1 glibc security update
Debian DSA Debian DSA DSA-5678-1 glibc security update
EUVD EUVD EUVD-2024-31336 nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
Ubuntu USN Ubuntu USN USN-6804-1 GNU C Library vulnerabilities
History

Wed, 18 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Debian
Debian debian Linux
Gnu
Gnu glibc
Netapp
Netapp h300s
Netapp h300s Firmware
Netapp h410c
Netapp h410c Firmware
Netapp h410s
Netapp h410s Firmware
Netapp h500s
Netapp h500s Firmware
Netapp h700s
Netapp h700s Firmware
Netapp hci Bootstrap Os
CPEs cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*
Vendors & Products Debian
Debian debian Linux
Gnu
Gnu glibc
Netapp
Netapp h300s
Netapp h300s Firmware
Netapp h410c
Netapp h410c Firmware
Netapp h410s
Netapp h410s Firmware
Netapp h500s
Netapp h500s Firmware
Netapp h700s
Netapp h700s Firmware
Netapp hci Bootstrap Os

Wed, 26 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 13 Feb 2025 18:00:00 +0000

Type Values Removed Values Added
Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

Subscriptions

Debian Debian Linux
Gnu Glibc
Netapp H300s H300s Firmware H410c H410c Firmware H410s H410s Firmware H500s H500s Firmware H700s H700s Firmware Hci Bootstrap Os
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Eus Rhel Tus Rhev Hypervisor Service Interconnect
cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published:

Updated: 2025-03-26T20:40:00.393Z

Reserved: 2024-04-24T20:35:08.340Z

Link: CVE-2024-33599

cve-icon Vulnrichment

Updated: 2024-08-02T02:36:04.290Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-06T20:15:11.437

Modified: 2025-06-18T14:56:01.037

Link: CVE-2024-33599

cve-icon Redhat

Severity : Important

Publid Date: 2024-04-23T00:00:00Z

Links: CVE-2024-33599 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses