Vulnerability Details CVE-2024-33599
nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 51.0%
CVSS Severity
CVSS v3 Score 8.1
Products affected by CVE-2024-33599
-
-
-
cpe:2.3:a:gnu:glibc:2.16.0
-
cpe:2.3:a:gnu:glibc:2.16.90
-
-
cpe:2.3:a:gnu:glibc:2.17.90
-
-
cpe:2.3:a:gnu:glibc:2.18.90
-
-
cpe:2.3:a:gnu:glibc:2.19.90
-
-
cpe:2.3:a:gnu:glibc:2.20.90
-
-
cpe:2.3:a:gnu:glibc:2.21.90
-
-
cpe:2.3:a:gnu:glibc:2.22.90
-
-
cpe:2.3:a:gnu:glibc:2.23.90
-
-
cpe:2.3:a:gnu:glibc:2.24.90
-
-
cpe:2.3:a:gnu:glibc:2.25.90
-
-
cpe:2.3:a:gnu:glibc:2.26.9000
-
-
cpe:2.3:a:gnu:glibc:2.27.9000
-
-
cpe:2.3:a:gnu:glibc:2.28.9000
-
-
cpe:2.3:a:gnu:glibc:2.29.9000
-
-
cpe:2.3:a:gnu:glibc:2.30.9000
-
-
cpe:2.3:a:gnu:glibc:2.31.9000
-
-
cpe:2.3:a:gnu:glibc:2.32.0
-
cpe:2.3:a:gnu:glibc:2.32.9000
-
-
cpe:2.3:a:gnu:glibc:2.33.9000
-
-
cpe:2.3:a:gnu:glibc:2.34.9000
-
-
cpe:2.3:a:gnu:glibc:2.35.9000
-
-
cpe:2.3:a:gnu:glibc:2.36.113
-
cpe:2.3:a:gnu:glibc:2.36.9000
-
-
cpe:2.3:a:gnu:glibc:2.37.38
-
cpe:2.3:a:gnu:glibc:2.37.9000
-
-
cpe:2.3:a:gnu:glibc:2.38.19
-
cpe:2.3:a:gnu:glibc:2.38.9000
-
-
cpe:2.3:a:gnu:glibc:2.39.9000
-
-
-
-
-
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:netapp:h300s_firmware:-
-
cpe:2.3:o:netapp:h410c_firmware:-
-
cpe:2.3:o:netapp:h410s_firmware:-
-
cpe:2.3:o:netapp:h500s_firmware:-
-
cpe:2.3:o:netapp:h700s_firmware:-
-
cpe:2.3:o:netapp:hci_bootstrap_os:-