First published: Fri Dec 13 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17.
Credit: 3f572a00-62e2-4423-959a-7ea25eff1638
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >7.0.0<7.3.0.2 | |
RTI Connext DDS Professional | >6.1.0<6.1.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52059 is considered a critical vulnerability due to its potential for a buffer overflow, which can lead to arbitrary code execution.
To fix CVE-2024-52059, update RTI Connext Professional to versions 7.3.0.2 or 6.1.2.17 or later.
CVE-2024-52059 affects RTI Connext Professional versions from 7.0.0 before 7.3.0.2 and from 6.1.0 before 6.1.2.17.
CVE-2024-52059 can facilitate attacks that exploit buffer overflow conditions, potentially allowing attackers to execute arbitrary code.
Currently, the recommended remediation for CVE-2024-52059 is to apply the necessary software updates as there are no known workarounds.