nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/22/5 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240524-0011/ | Third Party Advisory |
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 | Broken Link |
http://www.openwall.com/lists/oss-security/2024/07/22/5 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20240524-0011/ | Third Party Advisory |
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 | Broken Link |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
History
18 Jun 2025, 14:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* |
|
References | () http://www.openwall.com/lists/oss-security/2024/07/22/5 - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240524-0011/ - Third Party Advisory | |
References | () https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 - Broken Link | |
First Time |
Netapp h300s
Netapp h300s Firmware Netapp h410s Netapp h410c Firmware Netapp h410s Firmware Netapp h410c Debian Gnu glibc Netapp h500s Netapp h500s Firmware Debian debian Linux Gnu Netapp Netapp h700s Netapp hci Bootstrap Os Netapp h700s Firmware |
26 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
13 Feb 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. |
21 Nov 2024, 09:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/07/22/5 - | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html - | |
References | () https://security.netapp.com/advisory/ntap-20240524-0011/ - | |
References | () https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 - |
22 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jun 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 May 2024, 13:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 May 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-06 20:15
Updated : 2025-06-18 14:56
NVD link : CVE-2024-33599
Mitre link : CVE-2024-33599
CVE.ORG link : CVE-2024-33599
JSON object : View
Products Affected
netapp
- h700s_firmware
- h410c_firmware
- h300s_firmware
- h300s
- h500s
- h410s
- h410s_firmware
- h500s_firmware
- h410c
- h700s
- hci_bootstrap_os
debian
- debian_linux
gnu
- glibc
CWE
CWE-121
Stack-based Buffer Overflow