gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
References
| Link | Resource |
|---|---|
| https://gitlab.gnome.org/GNOME/glib/-/issues/3461 | Exploit Issue Tracking |
| https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1 | Release Notes |
| https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2024/11/12/11 | Mailing List |
| https://lists.debian.org/debian-lts-announce/2024/11/msg00020.html | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20241206-0009/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-11-11 23:15
Updated : 2025-06-17 01:23
NVD link : CVE-2024-52533
Mitre link : CVE-2024-52533
CVE.ORG link : CVE-2024-52533
JSON object : View
Products Affected
gnome
- glib
netapp
- ontap_tools
- active_iq_unified_manager
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
