CVE-2024-5564: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
AI Analysis
Technical Summary
CVE-2024-5564 is a high-severity vulnerability identified in libndp version 1.0, a library used for parsing Neighbor Discovery Protocol (NDP) packets, which are integral to IPv6 networking. The vulnerability arises from improper validation of route length information within IPv6 router advertisement packets. Specifically, libndp fails to correctly check the size of input data before copying it into a buffer, leading to a classic buffer overflow condition. This flaw can be exploited by a local malicious user who crafts a malformed IPv6 router advertisement packet that triggers the overflow in NetworkManager, a widely used network configuration service on Linux-based systems. The buffer overflow can lead to arbitrary code execution, allowing an attacker to compromise confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score is 8.1, indicating a high severity with network attack vector, no privileges required, no user interaction needed, but with high attack complexity. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical role of NetworkManager in managing network connections and the potential for remote exploitation via crafted IPv6 packets.
Potential Impact
For European organizations, the impact of CVE-2024-5564 can be substantial, especially in environments relying heavily on Linux-based infrastructure and IPv6 networking. NetworkManager is commonly deployed across enterprise servers, workstations, and network devices. Exploitation could lead to unauthorized system control, data breaches, or denial of service, affecting critical business operations. Given the increasing adoption of IPv6 in Europe, particularly in sectors such as telecommunications, finance, government, and critical infrastructure, this vulnerability could be leveraged to disrupt services or gain persistent access to sensitive networks. The ability to exploit this vulnerability without authentication or user interaction increases the risk of automated attacks or wormable malware propagation within internal networks. Additionally, organizations with compliance requirements around data protection (e.g., GDPR) may face regulatory and reputational consequences if exploited.
Mitigation Recommendations
To mitigate CVE-2024-5564, European organizations should prioritize the following actions: 1) Immediately apply patches or updates from NetworkManager and libndp maintainers once available; monitor vendor advisories closely. 2) Implement network-level filtering to block or scrutinize malformed IPv6 router advertisement packets, using firewalls or intrusion prevention systems capable of deep packet inspection. 3) Restrict IPv6 router advertisement acceptance to trusted network segments and devices to reduce exposure to malicious packets. 4) Employ host-based intrusion detection and prevention systems to detect anomalous network behavior indicative of exploitation attempts. 5) Conduct regular vulnerability assessments and penetration testing focusing on IPv6 network components. 6) Educate system administrators and network engineers about this vulnerability and the importance of validating IPv6 traffic. 7) Where feasible, disable IPv6 on systems or interfaces not requiring it to minimize attack surface until patches are applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Belgium, Italy
CVE-2024-5564: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Description
A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
AI-Powered Analysis
Technical Analysis
CVE-2024-5564 is a high-severity vulnerability identified in libndp version 1.0, a library used for parsing Neighbor Discovery Protocol (NDP) packets, which are integral to IPv6 networking. The vulnerability arises from improper validation of route length information within IPv6 router advertisement packets. Specifically, libndp fails to correctly check the size of input data before copying it into a buffer, leading to a classic buffer overflow condition. This flaw can be exploited by a local malicious user who crafts a malformed IPv6 router advertisement packet that triggers the overflow in NetworkManager, a widely used network configuration service on Linux-based systems. The buffer overflow can lead to arbitrary code execution, allowing an attacker to compromise confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score is 8.1, indicating a high severity with network attack vector, no privileges required, no user interaction needed, but with high attack complexity. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical role of NetworkManager in managing network connections and the potential for remote exploitation via crafted IPv6 packets.
Potential Impact
For European organizations, the impact of CVE-2024-5564 can be substantial, especially in environments relying heavily on Linux-based infrastructure and IPv6 networking. NetworkManager is commonly deployed across enterprise servers, workstations, and network devices. Exploitation could lead to unauthorized system control, data breaches, or denial of service, affecting critical business operations. Given the increasing adoption of IPv6 in Europe, particularly in sectors such as telecommunications, finance, government, and critical infrastructure, this vulnerability could be leveraged to disrupt services or gain persistent access to sensitive networks. The ability to exploit this vulnerability without authentication or user interaction increases the risk of automated attacks or wormable malware propagation within internal networks. Additionally, organizations with compliance requirements around data protection (e.g., GDPR) may face regulatory and reputational consequences if exploited.
Mitigation Recommendations
To mitigate CVE-2024-5564, European organizations should prioritize the following actions: 1) Immediately apply patches or updates from NetworkManager and libndp maintainers once available; monitor vendor advisories closely. 2) Implement network-level filtering to block or scrutinize malformed IPv6 router advertisement packets, using firewalls or intrusion prevention systems capable of deep packet inspection. 3) Restrict IPv6 router advertisement acceptance to trusted network segments and devices to reduce exposure to malicious packets. 4) Employ host-based intrusion detection and prevention systems to detect anomalous network behavior indicative of exploitation attempts. 5) Conduct regular vulnerability assessments and penetration testing focusing on IPv6 network components. 6) Educate system administrators and network engineers about this vulnerability and the importance of validating IPv6 traffic. 7) Where feasible, disable IPv6 on systems or interfaces not requiring it to minimize attack surface until patches are applied.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-05-31T13:34:41.061Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68379c5b182aa0cae261d62b
Added to database: 5/28/2025, 11:29:31 PM
Last enriched: 7/7/2025, 4:58:50 AM
Last updated: 7/31/2025, 8:29:35 AM
Views: 19
Related Threats
CVE-2025-49568: Use After Free (CWE-416) in Adobe Illustrator
MediumCVE-2025-49567: NULL Pointer Dereference (CWE-476) in Adobe Illustrator
MediumCVE-2025-49564: Stack-based Buffer Overflow (CWE-121) in Adobe Illustrator
HighCVE-2025-49563: Out-of-bounds Write (CWE-787) in Adobe Illustrator
HighCVE-2025-32086: Escalation of Privilege in Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.