CVE-2024-39750
Published: 25 January 2025
Summary
CVE-2024-39750 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Ibm Analytics Content Hub. Its CVSS base score is 8.8 (High).
Operationally, ranked in the top 18.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the buffer overflow vulnerability by identifying, prioritizing, and applying patches or fixes as provided in the IBM security advisory.
Prevents buffer overflows by enforcing validation of input lengths and bounds at entry points, addressing the improper return length checking root cause.
Mitigates exploitation of the buffer overflow for arbitrary code execution through memory safeguards like non-executable stacks and address randomization.
NVD Description
IBM Analytics Content Hub 2.0 is vulnerable to a buffer overflow due to improper return length checking. A remote authenticated attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash.
Deeper analysisAI
IBM Analytics Content Hub 2.0 is affected by CVE-2024-39750, a buffer overflow vulnerability caused by improper return length checking. This issue, mapped to CWE-120, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-01-25.
A remote authenticated attacker with low privileges can exploit the vulnerability over the network with low attack complexity and no user interaction. Exploitation enables buffer overflow, allowing arbitrary code execution on the system or a server crash resulting in denial of service.
IBM provides details on the vulnerability, including mitigation guidance, in its security advisory at https://www.ibm.com/support/pages/node/7172787.
Details
- CWE(s)