CVE-2024-33601
📋 TL;DR
A memory allocation failure in nscd's netgroup cache can cause the daemon to terminate, resulting in denial of service for clients relying on name service caching. This affects systems running glibc 2.15 or later with nscd enabled. The vulnerability is limited to the nscd binary itself.
💻 Affected Systems
- glibc
- nscd
📦 What is this software?
Glibc by Gnu
The GNU C Library (glibc) is the core C library for Linux systems, providing essential system calls and basic functions for all C programs. It is a fundamental component that nearly every Linux application depends on.
Learn more about Glibc →⚠️ Risk & Real-World Impact
Worst Case
nscd crashes repeatedly under memory pressure, causing sustained denial of service for all name service lookups (DNS, NIS, LDAP) that rely on caching, potentially disrupting authentication and system operations.
Likely Case
Intermittent nscd crashes during high memory usage scenarios, causing temporary service degradation for cached name lookups until the daemon restarts.
If Mitigated
If nscd is disabled or memory allocation failures are prevented, impact is minimal as clients fall back to direct name service queries with performance penalty.
🎯 Exploit Status
Exploitation requires triggering memory allocation failures in nscd, which is difficult to control reliably. No known active exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: glibc 2.39 or later, or distribution-specific backports
Vendor Advisory: https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
Restart Required: Yes
Instructions:
1. Update glibc to patched version via package manager. 2. Restart nscd service: systemctl restart nscd or service nscd restart. 3. Verify nscd is running and stable.
🔧 Temporary Workarounds
Disable nscd
linuxStop and disable the nscd service to eliminate the vulnerability
systemctl stop nscd
systemctl disable nscd
Disable netgroup caching
linuxConfigure nscd to not cache netgroup lookups
echo "enable-cache netgroup no" >> /etc/nscd.conf
systemctl restart nscd
🧯 If You Can't Patch
- Disable nscd service entirely if not critically needed
- Implement memory monitoring and alerting to detect allocation failures before they trigger crashes
🔍 How to Verify
Check if Vulnerable:
Check glibc version: ldd --version | head -1. If version >= 2.15 and nscd is running (systemctl status nscd), system may be vulnerable.
Check Version:
ldd --version | head -1
Verify Fix Applied:
Verify glibc version is patched (>= 2.39 or distribution backport) and nscd runs without crashes under load.
📡 Detection & Monitoring
Log Indicators:
- nscd crash logs in systemd journal or /var/log/messages
- Memory allocation failure messages related to nscd
Network Indicators:
- Increased DNS/NIS/LDAP query latency if nscd crashes
SIEM Query:
process.name="nscd" AND (event.action="crashed" OR log.level="emerg" OR log.level="alert")
🔗 References
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0014/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0014/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007