CVE-2024-52296
CVSS V2 None
CVSS V3 None
Description
libosdp is an implementation of IEC 60839-11-5 OSDP (Open Supervised Device Protocol) and provides a C library with support for C++, Rust and Python3. At ospd_common.c, on the osdp_reply_name function, any reply id between REPLY_ACK and REPLY_XRD is valid, but names array do not declare all of the range. On a case of an undefined reply id within the range, name will be null (name = names[reply_id - REPLY_ACK];). Null name will casue a crash on next line: if (name[0] == '\0') as null[0] is invalid. As this logic is not limited to a secure connection, attacker may trigger this vulnerability without any prior knowledge. This issue is fixed in 2.4.0.
Overview
- CVE ID
- CVE-2024-52296
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-11-12T15:58:28.434Z
- Last Modified Date
- 2024-11-12T15:58:28.434Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/goToMain/libosdp/security/advisories/GHSA-7945-5mcv-f2pp | x_refsource_CONFIRM |
https://github.com/goToMain/libosdp/commit/24409e98a260176765956ec766a04cb35984fab1 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-52296 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52296 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-11-13 13:47:16 | Added to TrackCVE |