CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-43168

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00035/1

CVE-2024-43168 is a reported heap-buffer-overflow in Unbound's config_file.c that may lead to memory corruption. While disputed by the original developer (NLnet Labs) who considers it within expected functionality, Red Hat claims a security risk in their products. The vulnerability lies in the cfg_mark_ports function and could potentially be exploited by an attacker with local access using specially crafted input. If exploitable, this could cause the application to crash or, in the worst case, allow for arbitrary code execution leading to a denial of service. The SOCRadar Vulnerability Risk Score (SVRS) for CVE-2024-43168 is 30, indicating a lower level of immediate risk, but requires monitoring, especially if using affected Red Hat products. Although tagged 'In The Wild', the dispute over its exploitability suggests caution when prioritizing patching, emphasizing the need to evaluate based on your specific environment.

In The Wild
2024-08-12

2024-10-21

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

CVE-2024-43168 A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an at… https://t.co/bD68i4tbuo
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://access.redhat.com/security/cve/CVE-2024-43168
[email protected]https://bugzilla.redhat.com/show_bug.cgi?id=2303462
[email protected]https://github.com/NLnetLabs/unbound/issues/1039
[email protected]https://github.com/NLnetLabs/unbound/pull/1040/files
[email protected]https://access.redhat.com/security/cve/CVE-2024-43168
[email protected]https://bugzilla.redhat.com/show_bug.cgi?id=2303462
[email protected]https://github.com/NLnetLabs/unbound/issues/1039
[email protected]https://github.com/NLnetLabs/unbound/pull/1040/files
GITHUBhttps://github.com/NLnetLabs/unbound/issues/1039

CWE Details

CWE IDCWE NameDescription
CWE-122Heap-based Buffer OverflowA heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence