Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.rti.com/vulnerabilities/#cve-2024-52066 |
|
History
Mon, 16 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40. | |
| Title | Potential stack corruption in Routing Service when using a malicious XML configuration document | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: RTI
Published: 2024-12-13T10:23:18.645Z
Updated: 2025-02-06T17:45:36.007Z
Reserved: 2024-11-05T19:04:16.676Z
Link: CVE-2024-52066
Updated: 2024-12-16T18:49:54.872Z
Status : Received
Published: 2024-12-13T11:15:09.330
Modified: 2024-12-13T11:15:09.330
Link: CVE-2024-52066
No data.