First published: Fri Dec 13 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45.
Credit: 3f572a00-62e2-4423-959a-7ea25eff1638
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >=7.0.0<7.3.0.5 | |
RTI Connext DDS Professional | >=6.1.0<6.1.2.21 | |
RTI Connext DDS Professional | >=6.0.0<=6.0.* | |
RTI Connext DDS Professional | >=5.3.0<5.3.1.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-52060 is classified as a high-severity vulnerability due to the potential for buffer overflow attacks.
To fix CVE-2024-52060, upgrade RTI Connext Professional to a version that is not affected by this vulnerability.
CVE-2024-52060 affects versions of RTI Connext Professional from 5.3.0 up to but not including 7.3.0.5.
CVE-2024-52060 is categorized as a buffer overflow vulnerability.
Yes, CVE-2024-52060 can be exploited remotely via environment variables.