Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46105 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45. |
| Link | Providers |
|---|---|
| https://www.rti.com/vulnerabilities/#cve-2024-52062 |
|
Thu, 02 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 23 Dec 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45. | |
| Title | Potential stack buffer write overflow in Connext applications while parsing malicious XML types document | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: RTI
Published:
Updated: 2025-02-07T21:48:51.526Z
Reserved: 2024-11-05T19:04:16.675Z
Link: CVE-2024-52062
Updated: 2024-12-23T20:00:47.166Z
Status : Analyzed
Published: 2024-12-13T11:15:08.650
Modified: 2025-10-02T13:40:24.267
Link: CVE-2024-52062
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:15:03Z
EUVD