Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46102 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17. |
| Link | Providers |
|---|---|
| https://www.rti.com/vulnerabilities/#cve-2024-52059 |
|
Thu, 02 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 07 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 31 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17. | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17. |
| Title | Potential heap buffer overflow in Security Plugins while creating a DomainParticipant that uses a malformed Identity Certificate | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Heap-based Buffer Overflow, Integer Overflow or Wraparound vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags. |
| Weaknesses | CWE-122 CWE-190 |
Mon, 23 Dec 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Security Plugins) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.17. | |
| Title | Potential heap buffer overflow in Security Plugins while creating a DomainParticipant that uses a malformed Identity Certificate | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: RTI
Published:
Updated: 2025-12-02T16:08:58.574Z
Reserved: 2024-11-05T19:04:16.675Z
Link: CVE-2024-52059
Updated: 2024-12-23T20:06:31.315Z
Status : Analyzed
Published: 2024-12-13T11:15:08.080
Modified: 2025-10-02T13:36:04.960
Link: CVE-2024-52059
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:34Z
EUVD