First published: Thu Apr 25 2024(Updated: )
glibc is vulnerable to a denial of service, caused by a memory allocation failure when the Name Service Cache Daemon's (nscd) netgroup cache uses the xmalloc or xrealloc functions. A local attacker could exploit this vulnerability to terminate the daemon.
Credit: 3ff69d7a-14f2-4f67-a097-88dee7810d18 3ff69d7a-14f2-4f67-a097-88dee7810d18
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-2 | |
F5 Traffix Systems Signaling Delivery Controller | >=5.1.0<=5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33601 has been classified as a denial of service vulnerability that could impact system availability.
To mitigate CVE-2024-33601, upgrade the affected glibc package to a version that addresses the vulnerability.
CVE-2024-33601 affects IBM QRadar Network Packet Capture and F5 Traffix SDC among other glibc implementations.
CVE-2024-33601 requires local access for exploitation and primarily targets the Name Service Cache Daemon.
An attacker exploiting CVE-2024-33601 could cause the Name Service Cache Daemon to terminate, leading to denial of service.