Cyber Posture

CVE-2024-57629

HighPublic PoC

Published: 14 January 2025

Published
14 January 2025
Modified
10 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0017 37.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

An issue in the tail_type component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.

Security Summary

CVE-2024-57629 is a vulnerability in the tail_type component of MonetDB Server version 11.49.1. It enables attackers to trigger a Denial of Service (DoS) condition through specially crafted SQL statements. The issue has a CVSS v3.1 base score of 7.5, rated as High severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility, low attack complexity, no privileges or user interaction required, and a high impact on availability but no impact on confidentiality or integrity. It is associated with CWE-89 (Improper Neutralization of Special Elements used in an SQL Command).

Remote, unauthenticated attackers can exploit this vulnerability over the network by sending malicious SQL statements to a vulnerable MonetDB Server instance. Successful exploitation leads to a DoS, potentially crashing the server or consuming excessive resources, disrupting service availability for legitimate users.

Further details, including potential patches or workarounds, are documented in the advisory at https://github.com/MonetDB/MonetDB/issues/7472. Security practitioners should consult this GitHub issue for updates on remediation.

Details

CWE(s)
CWE-89

Affected Products

monetdb
monetdb
11.49.1

References