Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional on non-Windows (Persistence Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.1.2 before 6.1.2.21, from 5.3.1.40 before 5.3.1.41.
History

Mon, 16 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Dec 2024 10:30:00 +0000

Type Values Removed Values Added
Description Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional on non-Windows (Persistence Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.1.2 before 6.1.2.21, from 5.3.1.40 before 5.3.1.41.
Title Potential stack buffer write overflow in Persistence Service while parsing malicious environment variable on non-Windows systems
Weaknesses CWE-120
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: RTI

Published: 2024-12-13T10:22:34.728Z

Updated: 2024-12-16T18:15:14.557Z

Reserved: 2024-11-05T19:04:16.676Z

Link: CVE-2024-52065

cve-icon Vulnrichment

Updated: 2024-12-16T18:15:07.026Z

cve-icon NVD

Status : Received

Published: 2024-12-13T11:15:09.153

Modified: 2024-12-13T11:15:09.153

Link: CVE-2024-52065

cve-icon Redhat

No data.