Search for vulnerabilities
Vulnerability ID | VCID-8wcp-7avm-vkfv |
Aliases |
CVE-2024-30949
|
Summary | An issue in newlib v.4.3.0 allows an attacker to execute arbitrary code via the time unit scaling in the _gettimeofday function. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 8.8 |
Risk | 4.4 |
Affected and Fixed Packages | Package Details |
CWE-190 | Integer Overflow or Wraparound |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30949.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2024-30949 | ||
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30949 | ||
20231129035714.469943-1-visitorckw%40gmail.com | https://inbox.sourceware.org/newlib/20231129035714.469943-1-visitorckw%40gmail.com/ | |
2306118 | https://bugzilla.redhat.com/show_bug.cgi?id=2306118 | |
6b26e599241ea80210ea136b28441661 | https://gist.github.com/visitorckw/6b26e599241ea80210ea136b28441661 | |
cpe:2.3:a:newlib_project:newlib:4.3.0:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:newlib_project:newlib:4.3.0:*:*:*:*:*:*:* | |
CVE-2024-30949 | https://nvd.nist.gov/vuln/detail/CVE-2024-30949 | |
?p=newlib-cygwin.git%3Ba=commit%3Bh=5f15d7c5817b07a6b18cbab17342c95cb7b42be4 | https://sourceware.org/git/?p=newlib-cygwin.git%3Ba=commit%3Bh=5f15d7c5817b07a6b18cbab17342c95cb7b42be4 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.76892 |
EPSS Score | 0.01078 |
Published At | July 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:53:52.495278+00:00 | Vulnrichment | Import | https://github.com/cisagov/vulnrichment/blob/develop/2024/30xxx/CVE-2024-30949.json | 37.0.0 |