Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability Affects RTI Connext Professional
CVE-2024-52063
8.3HIGH
What is CVE-2024-52063?
A buffer overflow vulnerability exists in the RTI Connext Professional, specifically within its Core Libraries and Routing Service. This issue can lead to overflow of variables and tags, resulting in potential exploitation by attackers. It affects multiple versions of the product, including those prior to specific updates, thereby posing risks to applications relying on this software. Users are urged to apply the necessary updates to mitigate this risk.
Affected Version(s)
Connext Professional 7.0.0 < 7.3.0.5
Connext Professional 6.1.0 < 6.1.2.21
Connext Professional 6.0.0 < 6.0.1.40
References
CVSS V4
Score:
8.3
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved