Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0684: Heap-based Buffer Overflow

0
Medium
VulnerabilityCVE-2024-0684cvecve-2024-0684
Published: Tue Feb 06 2024 (02/06/2024, 08:26:58 UTC)
Source: CVE Database V5

Description

A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:12:24 UTC

Technical Analysis

CVE-2024-0684 identifies a heap-based buffer overflow vulnerability in the GNU coreutils 'split' utility, specifically in versions 9.2 through 9.4. The vulnerability arises within the line_bytes_split() function, which processes user-supplied input to split files into smaller chunks. When the input data size exceeds expected bounds by several hundred bytes, the function fails to properly validate or limit memory allocation or copying operations, resulting in a heap overflow. This overflow can corrupt the heap memory, leading to application instability and crashes. The vulnerability requires local access with low privileges (AV:L, PR:L) and does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the local application context. The CVSS v3.1 base score is 5.5, reflecting a medium severity primarily due to the potential for denial of service (availability impact). There is no confidentiality or integrity impact, and no known exploits have been reported in the wild as of the publication date. The flaw is significant for environments where GNU coreutils 'split' is used in automated scripts or batch processing, as a crash could disrupt workflows or services. The vulnerability was assigned and published by Fedora security team and is currently in a published state, but no official patches or mitigation links were provided at the time of reporting.

Potential Impact

For European organizations, the primary impact of CVE-2024-0684 is denial of service caused by application crashes when processing specially crafted input with the vulnerable 'split' utility. This can disrupt automated data processing pipelines, backup routines, or any system relying on GNU coreutils for file manipulation. While the vulnerability does not allow data leakage or code execution, availability interruptions could affect critical infrastructure, especially in sectors like finance, telecommunications, and government services that rely heavily on Linux-based systems. Organizations with strict uptime requirements or those using 'split' in security-sensitive contexts may face operational risks. The lack of known exploits reduces immediate threat but does not eliminate risk, especially if attackers gain local access. The medium severity suggests prioritizing patching but not emergency response. The impact is more pronounced in environments with multi-user access or shared systems where untrusted users might trigger the overflow.

Mitigation Recommendations

European organizations should monitor official GNU coreutils repositories and Linux distribution security advisories for patches addressing CVE-2024-0684 and apply them promptly once available. In the interim, restrict local user access to systems running vulnerable versions to trusted personnel only, minimizing the risk of exploitation. Review and harden access controls and audit usage of the 'split' utility in scripts and batch jobs to detect anomalous inputs. Consider implementing input validation or limiting input sizes where feasible before passing data to 'split'. Employ system-level protections such as heap memory protection mechanisms (e.g., ASLR, heap canaries) to reduce exploitation impact. Regularly update and patch Linux distributions to benefit from vendor-supplied mitigations. Finally, incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2024-01-18T14:13:44.638Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47486d939959c8022327

Added to database: 11/4/2025, 6:34:48 PM

Last enriched: 11/4/2025, 10:12:24 PM

Last updated: 11/5/2025, 2:31:21 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats