Executive Summary

Informations
Name CVE-2024-52533 First vendor Publication 2024-11-11
Vendor Cve Last vendor Modification 2025-06-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 259
Application 1
Application 1
Os 1

Sources (Detail)

http://www.openwall.com/lists/oss-security/2024/11/12/11
https://gitlab.gnome.org/GNOME/glib/-/issues/3461
https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1
https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
https://lists.debian.org/debian-lts-announce/2024/11/msg00020.html
https://security.netapp.com/advisory/ntap-20241206-0009/
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2025-06-17 09:20:51
  • Multiple Updates
2024-12-06 17:20:35
  • Multiple Updates
2024-11-25 09:23:03
  • Multiple Updates
2024-11-12 21:16:50
  • Multiple Updates
2024-11-12 07:06:20
  • First insertion