First published: Fri Dec 13 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.
Credit: 3f572a00-62e2-4423-959a-7ea25eff1638
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >=7.0.0<7.3.0.5 | |
RTI Connext DDS Professional | >=6.1.0<6.1.2.21 | |
RTI Connext DDS Professional | >=6.0.0<6.0.1.40 | |
RTI Connext DDS Professional | >=5.0.0<5.3.1.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52063 is rated as a medium severity vulnerability due to its potential to cause buffer overflow incidents.
To fix CVE-2024-52063, upgrade RTI Connext Professional to version 7.3.0.5 or later, or to version 6.1.2.21 or later.
CVE-2024-52063 affects RTI Connext Professional versions 5.0.0 to 5.3.1.45, 6.0.0 to 6.0.1.40, 6.1.0 to 6.1.2.21, and 7.0.0 to 7.3.0.5.
CVE-2024-52063 represents a buffer overflow vulnerability due to buffer copying without size checks.
Exploiting CVE-2024-52063 could allow attackers to overwrite memory, potentially leading to data corruption or arbitrary code execution.