{"id":60979,"date":"2025-01-29T13:50:27","date_gmt":"2025-01-29T10:50:27","guid":{"rendered":"https:\/\/cvefeed.io\/vuln\/detail\/CVE-2024-40669"},"modified":"2025-01-29T13:50:27","modified_gmt":"2025-01-29T10:50:27","slug":"cve-2024-40669-apache-tbd-heap-use-after-free-local-privilege-escalation-vulnerability","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2024-40669-apache-tbd-heap-use-after-free-local-privilege-escalation-vulnerability\/","title":{"rendered":"CVE-2024-40669 &#8211; Apache TBD Heap Use-After-Free Local Privilege Escalation Vulnerability"},"content":{"rendered":"<p class=\"card-text\"> The following table lists the changes that have been made to the <code>CVE-2024-40669<\/code> vulnerability over time. <\/p>\n<p class=\"card-text\"> Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability&#8217;s severity, exploitability, or other characteristics. <\/p>\n<div class=\"p-3 \">\n<ul class=\"acitivity-timeline-2 list-unstyled mb-0\">\n<li>\n<h6 class=\"fs-14\">CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0<\/h6>\n<p>Jan. 28, 2025<\/p>\n<div class=\"table-responsive\">\n<table class=\"table table-responsive table-bordered table-hover table-condensed\">\n<thead>\n<tr>\n<th scope=\"col\">Action<\/th>\n<th scope=\"col\">Type<\/th>\n<th scope=\"col\">Old Value<\/th>\n<th scope=\"col\">New Value<\/th>\n<\/tr>\n<\/thead>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td>Added<\/td>\n<td>CVSS V3.1<\/td>\n<td><\/td>\n<td>AV:L\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H<\/td>\n<\/tr>\n<tr>\n<td>Added<\/td>\n<td>CWE<\/td>\n<td><\/td>\n<td>CWE-416<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/li>\n<li>\n<h6 class=\"fs-14\">New CVE Received by <a href=\"https:\/\/cvefeed.io\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"b4c7d1d7c1c6ddc0cdf4d5dad0c6dbddd09ad7dbd9\" target=\"_blank\" rel=\"noopener\">[email&nbsp;protected]<\/a><\/h6>\n<p>Jan. 28, 2025<\/p>\n<div class=\"table-responsive\">\n<table class=\"table table-responsive table-bordered table-hover table-condensed\">\n<thead>\n<tr>\n<th scope=\"col\">Action<\/th>\n<th scope=\"col\">Type<\/th>\n<th scope=\"col\">Old Value<\/th>\n<th scope=\"col\">New Value<\/th>\n<\/tr>\n<\/thead>\n<tbody readability=\"3.5\">\n<tr readability=\"5\">\n<td>Added<\/td>\n<td>Description<\/td>\n<td><\/td>\n<td>In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>Added<\/td>\n<td>Reference<\/td>\n<td><\/td>\n<td>https:\/\/source.android.com\/security\/bulletin\/2024-10-01<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The following table lists the changes that have been made to the CVE-2024-40669 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability&#8217;s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jan. 28, 2025 Action Type &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-60979","post","type-post","status-publish","format-standard","hentry","category-29"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=60979"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60979\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=60979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=60979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=60979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}