Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5564: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

0
High
VulnerabilityCVE-2024-5564cvecve-2024-5564
Published: Fri May 31 2024 (05/31/2024, 18:31:47 UTC)
Source: CVE Database V5

Description

A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:40:14 UTC

Technical Analysis

CVE-2024-5564 is a high-severity buffer overflow vulnerability found in libndp version 1.0, a library used by NetworkManager for handling IPv6 Neighbor Discovery Protocol (NDP) messages. The vulnerability arises due to improper validation of the route length information in IPv6 router advertisement packets. Specifically, libndp fails to correctly check the size of input data before copying it into a buffer, leading to a classic buffer overflow condition. This flaw can be triggered remotely by sending a malformed IPv6 router advertisement packet to a vulnerable system running NetworkManager that uses libndp 1.0. The buffer overflow can allow an unauthenticated attacker to execute arbitrary code with the privileges of the NetworkManager process, potentially leading to full system compromise. The CVSS v3.1 score of 8.1 reflects the network attack vector (AV:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a significant threat. The issue is rooted in the failure to validate route length fields in IPv6 router advertisements, which are commonly processed by NetworkManager on Linux-based systems, including many enterprise and server environments. This vulnerability highlights the risks associated with protocol parsing and the importance of rigorous input validation in network-facing components.

Potential Impact

For European organizations, the impact of CVE-2024-5564 could be substantial, especially for those relying on Linux-based infrastructure where NetworkManager is deployed, such as enterprise desktops, servers, and network devices. Successful exploitation could lead to remote code execution without authentication, allowing attackers to gain control over affected systems. This could result in data breaches, disruption of critical services, and lateral movement within corporate networks. Given the high confidentiality, integrity, and availability impacts, organizations handling sensitive data or critical infrastructure could face severe operational and reputational damage. Additionally, the vulnerability could be leveraged in targeted attacks against sectors such as finance, government, healthcare, and telecommunications, which are prevalent in Europe. The lack of required user interaction and the network-based attack vector increase the risk of automated exploitation attempts once proof-of-concept exploits become available.

Mitigation Recommendations

To mitigate CVE-2024-5564, European organizations should prioritize the following actions: 1) Immediately identify and inventory all systems running NetworkManager with libndp version 1.0. 2) Apply vendor patches or updates as soon as they are released; if patches are not yet available, consider temporarily disabling IPv6 router advertisement processing or NetworkManager on non-critical systems. 3) Implement network-level filtering to block or restrict unsolicited IPv6 router advertisement packets from untrusted sources, using firewall rules or router configurations. 4) Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting malformed IPv6 NDP packets to alert on or block suspicious traffic. 5) Conduct thorough network segmentation to limit exposure of vulnerable systems to untrusted networks. 6) Monitor logs and network traffic for anomalies related to IPv6 router advertisements. 7) Educate system administrators about the vulnerability and ensure rapid response capabilities for incident handling. These measures go beyond generic advice by focusing on immediate containment, network filtering specific to IPv6 router advertisements, and proactive monitoring tailored to the vulnerability's attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-05-31T13:34:41.061Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68379c5b182aa0cae261d62b

Added to database: 5/28/2025, 11:29:31 PM

Last enriched: 10/5/2025, 12:40:14 AM

Last updated: 10/16/2025, 3:12:28 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats