CVE-2024-52533

gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
Configurations

No configuration.

History

06 Dec 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241206-0009/ -

23 Nov 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/11/msg00020.html -

21 Nov 2024, 09:46

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/11/12/11 -

12 Nov 2024, 16:35

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

12 Nov 2024, 13:55

Type Values Removed Values Added
Summary
  • (es) gio/gsocks4aproxy.c en GNOME GLib anterior a 2.82.1 tiene un error de un byte y el consiguiente desbordamiento de búfer porque SOCKS4_CONN_MSG_LEN no es suficiente para un carácter '\0' final.

11 Nov 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-11 23:15

Updated : 2024-12-06 14:15


NVD link : CVE-2024-52533

Mitre link : CVE-2024-52533

CVE.ORG link : CVE-2024-52533


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')