CVE-2024-34490: n/a
In Maxima through 5.47.0 before 51704c, the plotting facilities make use of predictable names under /tmp. Thus, the contents may be controlled by a local attacker who can create files in advance with these names. This affects, for example, plot2d.
AI Analysis
Technical Summary
CVE-2024-34490 is a vulnerability identified in the Maxima computer algebra system, specifically in versions up to 5.47.0 before the commit identified as 51704c. The vulnerability stems from the plotting facilities, such as the plot2d function, which create temporary files in the /tmp directory using predictable file names. Because these file names are predictable, a local attacker with the ability to create files in /tmp can preemptively create files with these names, thereby controlling the contents that Maxima reads or writes during plotting operations. This is a classic example of a CWE-377 (Insecure Temporary File) vulnerability. The impact of this flaw is primarily on the integrity and availability of the plotting process, as an attacker could cause Maxima to use malicious or corrupted data, potentially leading to incorrect plot outputs or crashes. The CVSS 3.1 base score is 5.1 (medium severity), reflecting that exploitation requires local access with high privileges (PR:H), low attack complexity (AC:L), no user interaction (UI:N), and affects integrity and availability but not confidentiality. No remote exploitation is possible, and no known exploits have been reported in the wild as of the publication date. The vulnerability is mitigated by updating Maxima to versions after commit 51704c where the temporary file handling is presumably fixed to use secure, unpredictable file names or safer temporary file creation methods.
Potential Impact
The primary impact of CVE-2024-34490 is on the integrity and availability of Maxima's plotting functionality. Organizations relying on Maxima for mathematical computations and visualizations may experience incorrect plot outputs or application crashes if this vulnerability is exploited. Since exploitation requires local access with high privileges, the risk is limited to scenarios where an attacker already has significant access to the system, such as a compromised user account or insider threat. However, in multi-user environments or shared systems, this vulnerability could be leveraged to disrupt legitimate users' work or cause denial of service. There is no direct impact on confidentiality, so sensitive data leakage is not a concern here. The absence of known exploits in the wild reduces immediate risk, but the predictable nature of the flaw means it could be exploited in targeted attacks or by malicious insiders. Overall, the impact is moderate but should not be ignored in environments where Maxima is used extensively or where system integrity is critical.
Mitigation Recommendations
To mitigate CVE-2024-34490, organizations should: 1) Update Maxima to the latest version that includes the fix after commit 51704c, ensuring that temporary file creation uses secure, unpredictable names or secure APIs such as mkstemp. 2) Restrict local access to systems running Maxima, limiting the number of users with high privileges to reduce the attack surface. 3) Implement strict file system permissions on /tmp to prevent unauthorized file creation or manipulation by unprivileged users. 4) Monitor /tmp directory for suspicious file creation patterns that may indicate attempts to exploit this vulnerability. 5) Consider running Maxima in isolated environments or containers with limited access to the host file system to contain potential exploitation. 6) Educate system administrators and users about the risks of insecure temporary file handling and encourage prompt patching. These steps go beyond generic advice by focusing on controlling local access, securing the /tmp directory, and applying the specific patch or update.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, Canada, Australia, India, Brazil
CVE-2024-34490: n/a
Description
In Maxima through 5.47.0 before 51704c, the plotting facilities make use of predictable names under /tmp. Thus, the contents may be controlled by a local attacker who can create files in advance with these names. This affects, for example, plot2d.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-34490 is a vulnerability identified in the Maxima computer algebra system, specifically in versions up to 5.47.0 before the commit identified as 51704c. The vulnerability stems from the plotting facilities, such as the plot2d function, which create temporary files in the /tmp directory using predictable file names. Because these file names are predictable, a local attacker with the ability to create files in /tmp can preemptively create files with these names, thereby controlling the contents that Maxima reads or writes during plotting operations. This is a classic example of a CWE-377 (Insecure Temporary File) vulnerability. The impact of this flaw is primarily on the integrity and availability of the plotting process, as an attacker could cause Maxima to use malicious or corrupted data, potentially leading to incorrect plot outputs or crashes. The CVSS 3.1 base score is 5.1 (medium severity), reflecting that exploitation requires local access with high privileges (PR:H), low attack complexity (AC:L), no user interaction (UI:N), and affects integrity and availability but not confidentiality. No remote exploitation is possible, and no known exploits have been reported in the wild as of the publication date. The vulnerability is mitigated by updating Maxima to versions after commit 51704c where the temporary file handling is presumably fixed to use secure, unpredictable file names or safer temporary file creation methods.
Potential Impact
The primary impact of CVE-2024-34490 is on the integrity and availability of Maxima's plotting functionality. Organizations relying on Maxima for mathematical computations and visualizations may experience incorrect plot outputs or application crashes if this vulnerability is exploited. Since exploitation requires local access with high privileges, the risk is limited to scenarios where an attacker already has significant access to the system, such as a compromised user account or insider threat. However, in multi-user environments or shared systems, this vulnerability could be leveraged to disrupt legitimate users' work or cause denial of service. There is no direct impact on confidentiality, so sensitive data leakage is not a concern here. The absence of known exploits in the wild reduces immediate risk, but the predictable nature of the flaw means it could be exploited in targeted attacks or by malicious insiders. Overall, the impact is moderate but should not be ignored in environments where Maxima is used extensively or where system integrity is critical.
Mitigation Recommendations
To mitigate CVE-2024-34490, organizations should: 1) Update Maxima to the latest version that includes the fix after commit 51704c, ensuring that temporary file creation uses secure, unpredictable names or secure APIs such as mkstemp. 2) Restrict local access to systems running Maxima, limiting the number of users with high privileges to reduce the attack surface. 3) Implement strict file system permissions on /tmp to prevent unauthorized file creation or manipulation by unprivileged users. 4) Monitor /tmp directory for suspicious file creation patterns that may indicate attempts to exploit this vulnerability. 5) Consider running Maxima in isolated environments or containers with limited access to the host file system to contain potential exploitation. 6) Educate system administrators and users about the risks of insecure temporary file handling and encourage prompt patching. These steps go beyond generic advice by focusing on controlling local access, securing the /tmp directory, and applying the specific patch or update.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c52b7ef31ef0b5628fc
Added to database: 2/25/2026, 9:40:34 PM
Last enriched: 2/26/2026, 4:46:39 AM
Last updated: 4/12/2026, 9:24:48 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.