gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gnome
Gnome glib |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gnome
Gnome glib |
|
Metrics |
cvssV3_1
|
ssvc
|
Tue, 12 Nov 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | glib: buffer overflow in set_connect_msg() | |
Weaknesses | CWE-193 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 11 Nov 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-11T00:00:00
Updated: 2024-11-12T20:03:15.068Z
Reserved: 2024-11-11T00:00:00
Link: CVE-2024-52533
Vulnrichment
Updated: 2024-11-12T20:03:15.068Z
NVD
Status : Awaiting Analysis
Published: 2024-11-11T23:15:05.967
Modified: 2024-11-12T16:35:24.297
Link: CVE-2024-52533
Redhat