First published: Tue Mar 26 2024(Updated: )
In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX NetX Duo | <6.4.0 | |
Eclipse ThreadX NetX Duo | <6.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2452 is classified as a medium severity vulnerability due to its potential to cause heap buffer overflows.
To fix CVE-2024-2452, upgrade to Eclipse ThreadX NetX Duo version 6.4.0 or later.
CVE-2024-2452 is a heap buffer overflow vulnerability caused by integer wrap-around in memory allocation.
CVE-2024-2452 affects users of Eclipse ThreadX NetX Duo versions prior to 6.4.0.
Yes, CVE-2024-2452 can be exploited if an attacker can control parameters passed to the vulnerable function.