{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-2961","assignerOrgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","state":"PUBLISHED","assignerShortName":"glibc","dateReserved":"2024-03-26T19:29:31.186Z","datePublished":"2024-04-17T17:27:40.541Z","dateUpdated":"2026-05-12T11:30:35.910Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"glibc","vendor":"The GNU C Library","versions":[{"lessThan":"2.40","status":"affected","version":"2.1.93","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Charles Fol"}],"datePublic":"2024-04-17T17:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.<br>"}],"value":"The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable."}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]}],"references":[{"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/"},{"url":"http://www.openwall.com/lists/oss-security/2024/04/24/2"},{"url":"http://www.openwall.com/lists/oss-security/2024/04/17/9"},{"url":"http://www.openwall.com/lists/oss-security/2024/04/18/4"},{"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html"},{"url":"http://www.openwall.com/lists/oss-security/2024/05/27/2"},{"url":"http://www.openwall.com/lists/oss-security/2024/05/27/6"},{"url":"http://www.openwall.com/lists/oss-security/2024/05/27/1"},{"url":"http://www.openwall.com/lists/oss-security/2024/05/27/4"},{"url":"http://www.openwall.com/lists/oss-security/2024/05/27/5"},{"url":"http://www.openwall.com/lists/oss-security/2024/05/27/3"},{"url":"https://security.netapp.com/advisory/ntap-20240531-0002/"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"providerMetadata":{"orgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","shortName":"glibc","dateUpdated":"2024-07-22T18:06:06.282Z"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.3,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-01T00:00:00+00:00","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2024-2961"}}}],"affected":[{"cpes":["cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*"],"vendor":"gnu","product":"glibc","versions":[{"status":"affected","version":"2.1.93","lessThan":"2.40","versionType":"semver"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-30T03:55:59.233Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-11-15T15:22:29.055Z"},"references":[{"url":"https://www.ambionics.io/blog/iconv-cve-2024-2961-p1"},{"url":"https://www.ambionics.io/blog/iconv-cve-2024-2961-p2"},{"url":"https://www.ambionics.io/blog/iconv-cve-2024-2961-p3"},{"tags":["x_transferred"],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/"},{"tags":["x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/04/24/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/04/17/9"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/04/18/4"},{"tags":["x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/2"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/6"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/1"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/4"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/5"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/3"},{"tags":["x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20240531-0002/"},{"tags":["x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:30:35.910Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"}]}]},"dataVersion":"5.2"}