CVE-2024-52059

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17.
CVSS

No CVSS.

Configurations

No configuration.

History

31 Jul 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) La vulnerabilidad de copia de búfer sin comprobar el tamaño de la entrada ('Desbordamiento de búfer clásico') en RTI Connext Professional (complementos de seguridad) permite desbordamiento de variables y etiquetas. Este problema afecta a Connext Professional: desde 7.0.0 antes de 7.3.0.2, desde 6.1.0 antes de 6.1.2.17.
Summary (en) Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17. (en) Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17.
CWE CWE-190
CWE-122

13 Dec 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-13 11:15

Updated : 2025-07-31 15:15


NVD link : CVE-2024-52059

Mitre link : CVE-2024-52059

CVE.ORG link : CVE-2024-52059


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-122

Heap-based Buffer Overflow

CWE-190

Integer Overflow or Wraparound