nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: glibc
Published: 2024-05-06T19:21:54.314Z
Updated: 2024-08-02T02:36:04.290Z
Reserved: 2024-04-24T20:35:08.340Z
Link: CVE-2024-33599
Vulnrichment
Updated: 2024-05-29T19:01:22.692Z
NVD
Status : Awaiting Analysis
Published: 2024-05-06T20:15:11.437
Modified: 2024-07-22T18:15:03.323
Link: CVE-2024-33599
Redhat