First published: Fri Dec 13 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional on non-Windows (Persistence Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.1.2 before 6.1.2.21, from 5.3.1.40 before 5.3.1.41.
Credit: 3f572a00-62e2-4423-959a-7ea25eff1638
Affected Software | Affected Version | How to fix |
---|---|---|
RTI Connext DDS Professional | >=7.0.0<7.3.0.2 | |
RTI Connext DDS Professional | >=6.1.1.2<6.1.2.21 | |
RTI Connext DDS Professional | >=5.3.1.40<5.3.1.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52065 is classified as a critical severity vulnerability due to its potential to cause a buffer overflow.
To remediate CVE-2024-52065, upgrade RTI Connext Professional to version 7.3.0.2 or later, or apply necessary patches as provided by the vendor.
CVE-2024-52065 affects RTI Connext Professional versions from 7.0.0 before 7.3.0.2 and versions from 6.1.1.2 before 6.1.2.21.
CVE-2024-52065 is a buffer overflow vulnerability specifically caused by insufficient size checks during buffer copying operations.
Yes, CVE-2024-52065 can potentially be exploited remotely through environment variables, increasing the risk of unauthorized access.