First published: Thu Apr 25 2024(Updated: )
glibc is vulnerable to a denial of service, caused by a memory corruption by the Name Service Cache Daemon's (nscd) netgroup cache when the NSS callback fails to store all strings in the provided buffer. A local attacker could exploit this vulnerability to corrupt memory and cause a denial of service.
Credit: 3ff69d7a-14f2-4f67-a097-88dee7810d18 3ff69d7a-14f2-4f67-a097-88dee7810d18
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33602 is classified as a high severity vulnerability due to the potential for denial of service caused by memory corruption.
To fix CVE-2024-33602, update the glibc package to a version that is not affected, such as those released after the identified vulnerable versions.
CVE-2024-33602 affects IBM QRadar Network Packet Capture version 7.5.0 and various versions of the glibc package.
CVE-2024-33602 requires local access to the vulnerable system to exploit the memory corruption, thus limiting its potential for remote exploitation.
CVE-2024-33602 can enable denial of service attacks by corrupting memory within the affected services.