Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46109 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40. |
| Link | Providers |
|---|---|
| https://www.rti.com/vulnerabilities/#cve-2024-52066 |
|
Thu, 02 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 16 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40. | |
| Title | Potential stack corruption in Routing Service when using a malicious XML configuration document | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: RTI
Published:
Updated: 2025-02-06T17:45:36.007Z
Reserved: 2024-11-05T19:04:16.676Z
Link: CVE-2024-52066
Updated: 2024-12-16T18:49:54.872Z
Status : Analyzed
Published: 2024-12-13T11:15:09.330
Modified: 2025-10-02T13:47:46.823
Link: CVE-2024-52066
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:10:06Z
EUVD