First published: Fri Dec 13 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.
Credit: 3f572a00-62e2-4423-959a-7ea25eff1638
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >7.0.0<7.3.0.5 | |
RTI Connext DDS Professional | >6.1.0<6.1.2.21 | |
RTI Connext DDS Professional | >6.0.0<6.0.1.40 | |
RTI Connext DDS Professional | >5.0.0<5.3.1.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52062 is classified as a high severity vulnerability that can lead to buffer overflow issues.
To address CVE-2024-52062, it is recommended to upgrade RTI Connext Professional to version 7.3.0.5 or later, or to the appropriate patched version depending on your current version.
CVE-2024-52062 affects RTI Connext Professional versions from 5.0.0 to 5.3.1.45, from 6.0.0 to 6.1.2.21, and versions from 7.0.0 to 7.3.0.5.
CVE-2024-52062 is a 'Classic Buffer Overflow' vulnerability, specifically a buffer copy issue that does not check the size of input.
The potential impacts of CVE-2024-52062 include overflow variables and tags, which may lead to application crashes or unauthorized code execution.