Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34490: n/a

0
Medium
VulnerabilityCVE-2024-34490cvecve-2024-34490
Published: Sun May 05 2024 (05/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-34490 is a medium severity vulnerability in Maxima versions through 5. 47. 0 before commit 51704c, affecting its plotting facilities such as plot2d. The issue arises because Maxima uses predictable temporary file names under /tmp, which can be pre-created by a local attacker. This allows the attacker to control the contents of these files, potentially leading to denial of service or other impacts on integrity. Exploitation requires local access with high privileges and no user interaction is needed. The vulnerability does not affect confidentiality but impacts integrity and availability. No known exploits are currently reported in the wild. Organizations using Maxima for mathematical computations and plotting should apply patches or update to fixed versions once available to mitigate this risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:46:39 UTC

Technical Analysis

CVE-2024-34490 is a vulnerability identified in the Maxima computer algebra system, specifically in versions up to 5.47.0 before the commit identified as 51704c. The vulnerability stems from the plotting facilities, such as the plot2d function, which create temporary files in the /tmp directory using predictable file names. Because these file names are predictable, a local attacker with the ability to create files in /tmp can preemptively create files with these names, thereby controlling the contents that Maxima reads or writes during plotting operations. This is a classic example of a CWE-377 (Insecure Temporary File) vulnerability. The impact of this flaw is primarily on the integrity and availability of the plotting process, as an attacker could cause Maxima to use malicious or corrupted data, potentially leading to incorrect plot outputs or crashes. The CVSS 3.1 base score is 5.1 (medium severity), reflecting that exploitation requires local access with high privileges (PR:H), low attack complexity (AC:L), no user interaction (UI:N), and affects integrity and availability but not confidentiality. No remote exploitation is possible, and no known exploits have been reported in the wild as of the publication date. The vulnerability is mitigated by updating Maxima to versions after commit 51704c where the temporary file handling is presumably fixed to use secure, unpredictable file names or safer temporary file creation methods.

Potential Impact

The primary impact of CVE-2024-34490 is on the integrity and availability of Maxima's plotting functionality. Organizations relying on Maxima for mathematical computations and visualizations may experience incorrect plot outputs or application crashes if this vulnerability is exploited. Since exploitation requires local access with high privileges, the risk is limited to scenarios where an attacker already has significant access to the system, such as a compromised user account or insider threat. However, in multi-user environments or shared systems, this vulnerability could be leveraged to disrupt legitimate users' work or cause denial of service. There is no direct impact on confidentiality, so sensitive data leakage is not a concern here. The absence of known exploits in the wild reduces immediate risk, but the predictable nature of the flaw means it could be exploited in targeted attacks or by malicious insiders. Overall, the impact is moderate but should not be ignored in environments where Maxima is used extensively or where system integrity is critical.

Mitigation Recommendations

To mitigate CVE-2024-34490, organizations should: 1) Update Maxima to the latest version that includes the fix after commit 51704c, ensuring that temporary file creation uses secure, unpredictable names or secure APIs such as mkstemp. 2) Restrict local access to systems running Maxima, limiting the number of users with high privileges to reduce the attack surface. 3) Implement strict file system permissions on /tmp to prevent unauthorized file creation or manipulation by unprivileged users. 4) Monitor /tmp directory for suspicious file creation patterns that may indicate attempts to exploit this vulnerability. 5) Consider running Maxima in isolated environments or containers with limited access to the host file system to contain potential exploitation. 6) Educate system administrators and users about the risks of insecure temporary file handling and encourage prompt patching. These steps go beyond generic advice by focusing on controlling local access, securing the /tmp directory, and applying the specific patch or update.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c52b7ef31ef0b5628fc

Added to database: 2/25/2026, 9:40:34 PM

Last enriched: 2/26/2026, 4:46:39 AM

Last updated: 2/26/2026, 6:15:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats