CVE-2024-52533
moderate-risk
Published 2024-11-11
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
Do I need to act?
~
3.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (4)
References (6)
Release Notes
https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1
Vendor Advisory
https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
Third Party Advisory
https://security.netapp.com/advisory/ntap-20241206-0009/
48
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
10/34 · Low