An authenticated attacker may trigger a stack based buffer overflow by performing a malformed request to either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631). The malformed request will contain an empty Origin header value and a malformed Referer header value. The Referer header value will trigger a stack based buffer overflow when the host value in the Referer header is processed and is greater than 64 bytes in length.
References
Configurations
No configuration.
History
26 Jun 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf - |
25 Jun 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-25 08:15
Updated : 2025-06-26 18:58
NVD link : CVE-2024-51979
Mitre link : CVE-2024-51979
CVE.ORG link : CVE-2024-51979
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow