First published: Fri Dec 13 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45.
Credit: 3f572a00-62e2-4423-959a-7ea25eff1638
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >7.0.0<7.3.0.2 | |
RTI Connext DDS Professional | >6.1.0<6.1.2.21 | |
RTI Connext DDS Professional | >6.0.0<6.0.1.40 | |
RTI Connext DDS Professional | >5.0.0<5.3.1.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52064 is classified as a high-severity vulnerability due to its potential to cause buffer overflow issues.
To fix CVE-2024-52064, users should upgrade RTI Connext Professional to version 7.3.0.2 or later, version 6.1.2.21 or later, version 6.0.1.40 or later, or version 5.3.1.45 or later.
CVE-2024-52064 affects versions of RTI Connext Professional from 5.0.0 to before 5.3.1.45, from 6.0.0 to before 6.0.1.40, from 6.1.0 to before 6.1.2.21, and from 7.0.0 to before 7.3.0.2.
CVE-2024-52064 is classified as a buffer overflow vulnerability, specifically a 'Classic Buffer Overflow' type.
Yes, CVE-2024-52064 has the potential to lead to remote code execution if exploited successfully.