High severity7.2NVD Advisory· Published Jun 25, 2025· Updated Apr 15, 2026
CVE-2024-51979
CVE-2024-51979
Description
An authenticated attacker may trigger a stack based buffer overflow by performing a malformed request to either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631). The malformed request will contain an empty Origin header value and a malformed Referer header value. The Referer header value will trigger a stack based buffer overflow when the host value in the Referer header is processed and is greater than 64 bytes in length.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdfnvd
- support.brother.com/g/b/link.aspxnvd
- support.brother.com/g/b/link.aspxnvd
- support.brother.com/g/b/link.aspxnvd
- www.fujifilm.com/fbglobal/eng/company/news/notice/2025/0625_announce.htmlnvd
- www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdfnvd
- www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixednvd
- www.ricoh.com/products/security/vulnerabilities/vulnvd
News mentions
0No linked articles in our index yet.