- Description
- gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- glib, debian_linux, active_iq_unified_manager, ontap_tools
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-120
- Hype score
- Not currently trending
⚠️Actualización de seguridad para componentes de Dell RecoverPoint ❗CVE-2024-52533 ❗CVE-2018-20060 ❗CVE-2024-56337 ➡️Más info: https://t.co/GIGMcViI5N https://t.co/uwtVX3NC5O
@CERTpy
2 Sept 2025
136 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Vulnerability: CVE-2024-52533 affecting GitOnBorg::chromium::chromium::src https://t.co/RTghLBrDpX
@BugsAggregator
23 Jul 2025
329 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[1/5] ⚠️A stack buffer overflow vulnerability, CVE-2024-52533, has recently been found in the gio module of GNOME’s GLib. Despite being marked as critical by CISA, our findings reveal that its exploitation in real-world scenarios would be highly unlikely 🧵
@JFrogSecurity
14 Nov 2024
448 Impressions
0 Retweets
2 Likes
0 Bookmarks
1 Reply
1 Quote
CVE-2024-52533 gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0… https://t.co/2DVJ0eSblU
@CVEnew
11 Nov 2024
443 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
1 Quote
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32E09658-F3FD-4CCB-B082-45C8F17535C5",
"versionEndExcluding": "2.82.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]