Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional on non-Windows (Persistence Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.1.2 before 6.1.2.21, from 5.3.1.40 before 5.3.1.41.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.rti.com/vulnerabilities/#cve-2024-52065 |
History
Mon, 16 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional on non-Windows (Persistence Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.1.2 before 6.1.2.21, from 5.3.1.40 before 5.3.1.41. | |
Title | Potential stack buffer write overflow in Persistence Service while parsing malicious environment variable on non-Windows systems | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: RTI
Published: 2024-12-13T10:22:34.728Z
Updated: 2024-12-16T18:15:14.557Z
Reserved: 2024-11-05T19:04:16.676Z
Link: CVE-2024-52065
Vulnrichment
Updated: 2024-12-16T18:15:07.026Z
NVD
Status : Received
Published: 2024-12-13T11:15:09.153
Modified: 2024-12-13T11:15:09.153
Link: CVE-2024-52065
Redhat
No data.