Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1013: Use of Out-of-range Pointer Offset in Red Hat Red Hat Enterprise Linux 6

0
High
VulnerabilityCVE-2024-1013cvecve-2024-1013
Published: Mon Mar 18 2024 (03/18/2024, 10:53:02 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6

Description

An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:01:17 UTC

Technical Analysis

CVE-2024-1013 is a vulnerability identified in the unixODBC component of Red Hat Enterprise Linux 6, specifically affecting 64-bit architectures. The root cause is an out-of-bounds stack write due to a pointer offset mismatch: the caller allocates 4 bytes of stack space, but the callee function writes 8 bytes. This discrepancy leads to memory corruption, which may remain unnoticed on little-endian systems due to byte ordering but can cause functional failures or security breaches on big-endian architectures. The flaw can compromise system confidentiality, integrity, and availability by enabling an attacker with local privileges to overwrite adjacent stack memory, potentially leading to privilege escalation or arbitrary code execution. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with attack vector local, low attack complexity, requiring privileges but no user interaction. No public exploits have been reported yet, but the risk remains significant due to the nature of the flaw and the critical role of unixODBC in database connectivity. The vulnerability affects Red Hat Enterprise Linux 6, a platform still in use in some legacy environments, especially in enterprise and government sectors. The lack of patch links suggests that remediation may require vendor updates or manual mitigation steps.

Potential Impact

The vulnerability can lead to serious consequences including unauthorized privilege escalation, arbitrary code execution, or system crashes due to stack corruption. This compromises confidentiality by potentially exposing sensitive data, integrity by allowing unauthorized modifications, and availability by causing denial-of-service conditions. Organizations relying on RHEL 6 for critical database connectivity via unixODBC on 64-bit big-endian architectures are particularly vulnerable. Since exploitation requires local access and privileges, insider threats or attackers who have already gained limited access could leverage this flaw to escalate privileges further. The impact is amplified in environments where RHEL 6 is used in critical infrastructure, financial services, or government systems, where stability and security are paramount. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

Organizations should prioritize upgrading to a supported version of Red Hat Enterprise Linux where this vulnerability is resolved. If upgrading is not immediately feasible, applying any available vendor patches or security advisories related to unixODBC is critical. In the absence of patches, consider recompiling unixODBC with additional compiler protections such as stack canaries and address space layout randomization (ASLR). Restrict local access to trusted users only and monitor for unusual activity indicative of exploitation attempts. Employ mandatory access controls (e.g., SELinux) to limit the impact of potential exploitation. Regularly audit systems for unauthorized changes and maintain up-to-date backups to recover from potential compromises. Additionally, organizations should assess their architecture to identify and isolate big-endian 64-bit systems, as these are more susceptible to this flaw. Implementing intrusion detection systems focused on local privilege escalation attempts can provide early warning.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-01-29T08:43:03.223Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5c4ee672cd9080e8d4ab

Added to database: 11/20/2025, 6:22:06 PM

Last enriched: 2/28/2026, 8:01:17 AM

Last updated: 3/25/2026, 1:31:28 AM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses