{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-33601","assignerOrgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","state":"PUBLISHED","assignerShortName":"glibc","dateReserved":"2024-04-24T20:35:08.340Z","datePublished":"2024-05-06T19:22:07.763Z","dateUpdated":"2026-05-12T11:51:47.108Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"glibc","vendor":"The GNU C Library","versions":[{"lessThan":"2.40","status":"affected","version":"2.15","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>nscd: netgroup cache may terminate daemon on memory allocation failure<br><br>The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or<br>xrealloc and these functions may terminate the process due to a memory<br>allocation failure resulting in a denial of service to the clients.  The<br>flaw was introduced in glibc 2.15 when the cache was added to nscd.<br><br>This vulnerability is only present in the nscd binary.<br></div>"}],"value":"nscd: netgroup cache may terminate daemon on memory allocation failure\n\nThe Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or\nxrealloc and these functions may terminate the process due to a memory\nallocation failure resulting in a denial of service to the clients.  The\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\n\nThis vulnerability is only present in the nscd binary."}],"impacts":[{"capecId":"CAPEC-130","descriptions":[{"lang":"en","value":"CAPEC-130 Excessive Allocation"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-617","description":"CWE-617 Reachable Assertion","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","shortName":"glibc","dateUpdated":"2024-07-22T18:06:12.587Z"},"references":[{"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007"},{"url":"https://security.netapp.com/advisory/ntap-20240524-0014/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"}],"source":{"discovery":"UNKNOWN"},"title":"nscd: netgroup cache may terminate daemon on memory allocation failure","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"gnu","product":"glibc","cpes":["cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.15","status":"affected","lessThan":"2.40","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.3,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-09T17:26:01.322253Z","id":"CVE-2024-33601","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-18T13:55:13.348Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T02:36:04.342Z"},"title":"CVE Program Container","references":[{"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240524-0014/","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","tags":["x_transferred"]}]},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:51:47.108Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"}]}]},"dataVersion":"5.2"}