CVE-2024-34490: n/a
CVE-2024-34490 is a medium severity vulnerability in Maxima versions through 5. 47. 0 before commit 51704c, affecting its plotting facilities such as plot2d. The issue arises because Maxima uses predictable temporary file names under /tmp, which can be pre-created by a local attacker. This allows the attacker to control the contents of these files, potentially leading to denial of service or other impacts on integrity. Exploitation requires local access with high privileges and no user interaction is needed. The vulnerability does not affect confidentiality but impacts integrity and availability. No known exploits are currently reported in the wild. Organizations using Maxima for mathematical computations and plotting should apply patches or update to fixed versions once available to mitigate this risk.
AI Analysis
Technical Summary
CVE-2024-34490 is a vulnerability identified in the Maxima computer algebra system, specifically in versions up to 5.47.0 before the commit identified as 51704c. The vulnerability stems from the plotting facilities, such as the plot2d function, which create temporary files in the /tmp directory using predictable file names. Because these file names are predictable, a local attacker with the ability to create files in /tmp can preemptively create files with these names, thereby controlling the contents that Maxima reads or writes during plotting operations. This is a classic example of a CWE-377 (Insecure Temporary File) vulnerability. The impact of this flaw is primarily on the integrity and availability of the plotting process, as an attacker could cause Maxima to use malicious or corrupted data, potentially leading to incorrect plot outputs or crashes. The CVSS 3.1 base score is 5.1 (medium severity), reflecting that exploitation requires local access with high privileges (PR:H), low attack complexity (AC:L), no user interaction (UI:N), and affects integrity and availability but not confidentiality. No remote exploitation is possible, and no known exploits have been reported in the wild as of the publication date. The vulnerability is mitigated by updating Maxima to versions after commit 51704c where the temporary file handling is presumably fixed to use secure, unpredictable file names or safer temporary file creation methods.
Potential Impact
The primary impact of CVE-2024-34490 is on the integrity and availability of Maxima's plotting functionality. Organizations relying on Maxima for mathematical computations and visualizations may experience incorrect plot outputs or application crashes if this vulnerability is exploited. Since exploitation requires local access with high privileges, the risk is limited to scenarios where an attacker already has significant access to the system, such as a compromised user account or insider threat. However, in multi-user environments or shared systems, this vulnerability could be leveraged to disrupt legitimate users' work or cause denial of service. There is no direct impact on confidentiality, so sensitive data leakage is not a concern here. The absence of known exploits in the wild reduces immediate risk, but the predictable nature of the flaw means it could be exploited in targeted attacks or by malicious insiders. Overall, the impact is moderate but should not be ignored in environments where Maxima is used extensively or where system integrity is critical.
Mitigation Recommendations
To mitigate CVE-2024-34490, organizations should: 1) Update Maxima to the latest version that includes the fix after commit 51704c, ensuring that temporary file creation uses secure, unpredictable names or secure APIs such as mkstemp. 2) Restrict local access to systems running Maxima, limiting the number of users with high privileges to reduce the attack surface. 3) Implement strict file system permissions on /tmp to prevent unauthorized file creation or manipulation by unprivileged users. 4) Monitor /tmp directory for suspicious file creation patterns that may indicate attempts to exploit this vulnerability. 5) Consider running Maxima in isolated environments or containers with limited access to the host file system to contain potential exploitation. 6) Educate system administrators and users about the risks of insecure temporary file handling and encourage prompt patching. These steps go beyond generic advice by focusing on controlling local access, securing the /tmp directory, and applying the specific patch or update.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, Canada, Australia, India, Brazil
CVE-2024-34490: n/a
Description
CVE-2024-34490 is a medium severity vulnerability in Maxima versions through 5. 47. 0 before commit 51704c, affecting its plotting facilities such as plot2d. The issue arises because Maxima uses predictable temporary file names under /tmp, which can be pre-created by a local attacker. This allows the attacker to control the contents of these files, potentially leading to denial of service or other impacts on integrity. Exploitation requires local access with high privileges and no user interaction is needed. The vulnerability does not affect confidentiality but impacts integrity and availability. No known exploits are currently reported in the wild. Organizations using Maxima for mathematical computations and plotting should apply patches or update to fixed versions once available to mitigate this risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-34490 is a vulnerability identified in the Maxima computer algebra system, specifically in versions up to 5.47.0 before the commit identified as 51704c. The vulnerability stems from the plotting facilities, such as the plot2d function, which create temporary files in the /tmp directory using predictable file names. Because these file names are predictable, a local attacker with the ability to create files in /tmp can preemptively create files with these names, thereby controlling the contents that Maxima reads or writes during plotting operations. This is a classic example of a CWE-377 (Insecure Temporary File) vulnerability. The impact of this flaw is primarily on the integrity and availability of the plotting process, as an attacker could cause Maxima to use malicious or corrupted data, potentially leading to incorrect plot outputs or crashes. The CVSS 3.1 base score is 5.1 (medium severity), reflecting that exploitation requires local access with high privileges (PR:H), low attack complexity (AC:L), no user interaction (UI:N), and affects integrity and availability but not confidentiality. No remote exploitation is possible, and no known exploits have been reported in the wild as of the publication date. The vulnerability is mitigated by updating Maxima to versions after commit 51704c where the temporary file handling is presumably fixed to use secure, unpredictable file names or safer temporary file creation methods.
Potential Impact
The primary impact of CVE-2024-34490 is on the integrity and availability of Maxima's plotting functionality. Organizations relying on Maxima for mathematical computations and visualizations may experience incorrect plot outputs or application crashes if this vulnerability is exploited. Since exploitation requires local access with high privileges, the risk is limited to scenarios where an attacker already has significant access to the system, such as a compromised user account or insider threat. However, in multi-user environments or shared systems, this vulnerability could be leveraged to disrupt legitimate users' work or cause denial of service. There is no direct impact on confidentiality, so sensitive data leakage is not a concern here. The absence of known exploits in the wild reduces immediate risk, but the predictable nature of the flaw means it could be exploited in targeted attacks or by malicious insiders. Overall, the impact is moderate but should not be ignored in environments where Maxima is used extensively or where system integrity is critical.
Mitigation Recommendations
To mitigate CVE-2024-34490, organizations should: 1) Update Maxima to the latest version that includes the fix after commit 51704c, ensuring that temporary file creation uses secure, unpredictable names or secure APIs such as mkstemp. 2) Restrict local access to systems running Maxima, limiting the number of users with high privileges to reduce the attack surface. 3) Implement strict file system permissions on /tmp to prevent unauthorized file creation or manipulation by unprivileged users. 4) Monitor /tmp directory for suspicious file creation patterns that may indicate attempts to exploit this vulnerability. 5) Consider running Maxima in isolated environments or containers with limited access to the host file system to contain potential exploitation. 6) Educate system administrators and users about the risks of insecure temporary file handling and encourage prompt patching. These steps go beyond generic advice by focusing on controlling local access, securing the /tmp directory, and applying the specific patch or update.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c52b7ef31ef0b5628fc
Added to database: 2/25/2026, 9:40:34 PM
Last enriched: 2/26/2026, 4:46:39 AM
Last updated: 2/26/2026, 6:15:52 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.