Severity
8.1HIGH
EPSS
0.6%
top 29.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 6
Latest updateMay 31

Description

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages4 packages

NVDgnu/glibc2.152.40
CVEListV5the_gnu_c_library/glibc2.152.40
Debianglibc< 2.31-13+deb11u10+3
Ubuntuglibc< 2.31-0ubuntu9.16+4

Also affects: Debian Linux 10.0

🔴Vulnerability Details

4
OSV
glibc vulnerabilities2024-05-31
OSV
CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a2024-05-06
CVEList
nscd: Stack-based buffer overflow in netgroup cache2024-05-06
GHSA
GHSA-9gvm-vcgf-x5xw: nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a2024-05-06

📋Vendor Advisories

4
Ubuntu
GNU C Library vulnerabilities2024-05-31
Microsoft
nscd: Stack-based buffer overflow in netgroup cache2024-05-14
Red Hat
glibc: stack-based buffer overflow in netgroup cache2024-04-23
Debian
CVE-2024-33599: glibc - nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache D...2024
CVE-2024-33599 (HIGH CVSS 8.1) | nscd: Stack-based buffer overflow i | cvebase.io