First published: Fri Dec 13 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Queuing Service, Recording Service, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.
Credit: 3f572a00-62e2-4423-959a-7ea25eff1638
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >7.5.0>=7.4.0>7.3.0.5>=7.0.0>6.1.2.21>=6.1.0>6.0.1.40>=6.0.0>5.3.1.45>=5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52061 is classified as a buffer overflow vulnerability which can lead to potential code execution.
To mitigate CVE-2024-52061, upgrade to RTI Connext Professional version 7.5.0 or later.
CVE-2024-52061 affects RTI Connext Professional versions from 5.0.0 up to, but not including, 7.5.0.
CVE-2024-52061 impacts the Core Libraries, Queuing Service, Recording Service, and Routing Service within RTI Connext Professional.
Yes, CVE-2024-52061 can potentially lead to data loss due to undefined behavior caused by the buffer overflow.