Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33783: n/a

0
Medium
VulnerabilityCVE-2024-33783cvecve-2024-33783
Published: Tue May 07 2024 (05/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

MP-SPDZ v0.3.8 was discovered to contain a segmentation violation via the function osuCrypto::SilentMultiPprfReceiver::expand in /Tools/SilentPprf.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:01:28 UTC

Technical Analysis

CVE-2024-33783 identifies a vulnerability in MP-SPDZ version 0.3.8, a software framework used for secure multi-party computation (MPC). The issue arises from a segmentation violation in the function osuCrypto::SilentMultiPprfReceiver::expand located in the SilentPprf.cpp source file. This function is part of the cryptographic protocol implementation, specifically handling silent pseudorandom function (PRF) expansions. The segmentation fault is triggered when the function processes a specially crafted message, which leads to improper memory access, causing the application to crash. The root cause aligns with CWE-120, indicating a buffer overflow or improper bounds checking during memory operations. The vulnerability can be exploited remotely over the network (AV:N) without requiring privileges (PR:N), but it does require user interaction (UI:R) in the form of processing the malicious message. The scope is unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. The CVSS v3.1 base score is 6.5, reflecting a medium severity level. No patches or known exploits have been reported at the time of publication, but the vulnerability poses a risk of denial of service to systems running the affected MP-SPDZ version.

Potential Impact

The primary impact of this vulnerability is denial of service, which can disrupt the availability of MP-SPDZ-based secure computation services. Organizations relying on MP-SPDZ for privacy-preserving computations, such as financial institutions, research entities, or government agencies, may experience service interruptions if targeted. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can delay critical computations and affect dependent business processes. Since MP-SPDZ is specialized software used in cryptographic research and applications, the affected user base is niche but critical. Attackers could exploit this flaw to degrade service reliability or cause repeated crashes, potentially impacting collaborative computations or secure data sharing. The lack of required privileges lowers the barrier to exploitation, increasing risk in exposed environments. However, the need for user interaction and crafted message delivery somewhat limits the attack surface to scenarios where malicious inputs are accepted and processed.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for updates or patches from the MP-SPDZ maintainers and apply them promptly once available. In the absence of an official patch, consider implementing input validation and sanitization to detect and reject malformed or suspicious messages before processing. Employ network-level protections such as firewalls and intrusion detection systems to limit exposure to untrusted sources sending crafted messages. Additionally, isolate MP-SPDZ services within segmented network zones to reduce attack surface. Implement robust logging and monitoring to detect abnormal crashes or service disruptions indicative of exploitation attempts. Where feasible, conduct code audits focusing on memory management in osuCrypto::SilentMultiPprfReceiver::expand and related functions to identify and remediate unsafe operations. Finally, educate users and administrators about the risk of processing untrusted inputs and enforce strict access controls to minimize unauthorized message submissions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c45b7ef31ef0b561ca4

Added to database: 2/25/2026, 9:40:21 PM

Last enriched: 2/28/2026, 3:01:28 AM

Last updated: 4/12/2026, 3:33:39 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses