nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
CVSS
No CVSS.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/22/5 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/07/22/5 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240524-0011/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240524-0011/ | Third Party Advisory |
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 | Broken Link |
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 | Broken Link |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
History
18 Jun 2025, 14:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gnu
Netapp h300s Netapp h410c Netapp h500s Netapp h500s Firmware Gnu glibc Netapp hci Bootstrap Os Netapp h410s Firmware Netapp h700s Firmware Netapp h410c Firmware Netapp h300s Firmware Netapp h410s Netapp Netapp h700s Debian debian Linux Debian |
|
References | () https://security.netapp.com/advisory/ntap-20240524-0011/ - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/22/5 - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html - Mailing List, Third Party Advisory | |
References | () https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 - Broken Link | |
CPE | cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* |
13 Feb 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
Summary | nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. |
22 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jun 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 May 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-06 20:15
Updated : 2025-06-18 14:56
NVD link : CVE-2024-33599
Mitre link : CVE-2024-33599
JSON object : View
Products Affected
debian
- debian_linux
netapp
- h500s
- h410s
- hci_bootstrap_os
- h410c_firmware
- h300s
- h700s_firmware
- h500s_firmware
- h410s_firmware
- h700s
- h410c
- h300s_firmware
gnu
- glibc
CWE
No CWE.