A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-33600

CVE-2024-33600: GNU glibc nscd DoS Vulnerability

CVE-2024-33600 is a denial of service vulnerability in GNU glibc's Name Service Cache Daemon (nscd) that causes null pointer crashes. This article covers the technical details, affected versions, impact, and mitigation.

Published: January 28, 2026

CVE-2024-33600 Overview

CVE-2024-33600 is a null pointer dereference vulnerability affecting the Name Service Cache Daemon (nscd) in the GNU C Library (glibc). When the nscd cache fails to add a not-found netgroup response to the cache, client requests can result in a null pointer dereference, causing the daemon to crash. This flaw was introduced in glibc 2.15 when the cache was added to nscd and affects only the nscd binary.

Critical Impact

Remote attackers can trigger denial of service conditions by causing the nscd daemon to crash through specially crafted netgroup lookup requests, potentially disrupting name resolution services across affected systems.

Affected Products

  • GNU glibc (versions 2.15 and later)
  • Debian Linux 10.0
  • NetApp Active IQ Unified Manager (VMware vSphere)
  • NetApp H-Series (H300S, H500S, H700S, H410S, H410C, H610C, H610S, H615C)
  • NetApp HCI Bootstrap OS

Discovery Timeline

  • May 6, 2024 - CVE-2024-33600 published to NVD
  • June 18, 2025 - Last updated in NVD database

Technical Details for CVE-2024-33600

Vulnerability Analysis

The vulnerability exists within the nscd (Name Service Cache Daemon) component of glibc, specifically in the handling of netgroup cache entries. When a netgroup lookup returns a "not-found" response, the nscd attempts to cache this negative result. However, if the cache addition fails for any reason (such as memory allocation failure or cache capacity issues), the subsequent code path does not properly handle this failure case.

The code proceeds to dereference a pointer that should have been set during the cache addition but remains null due to the failure. This null pointer dereference causes the nscd process to crash, effectively creating a denial of service condition for all services relying on nscd for name resolution caching.

Since nscd is commonly used in enterprise environments to improve performance of name service lookups (user/group names, hostnames, etc.), a crash can have cascading effects on authentication, network services, and application functionality.

Root Cause

The root cause is improper error handling in the nscd cache management code (CWE-476: NULL Pointer Dereference). When adding a not-found netgroup response to the cache fails, the code does not validate that required data structures were properly initialized before attempting to use them. This missing null check was introduced in glibc version 2.15 when netgroup caching functionality was added to nscd.

Attack Vector

The attack can be performed remotely over the network. An attacker needs to trigger conditions where:

  1. A netgroup lookup request is made to nscd
  2. The lookup returns a "not-found" response
  3. The cache addition operation fails (which may occur naturally under resource constraints or could potentially be influenced by the attacker)

When these conditions align, the null pointer dereference occurs, crashing the nscd daemon. The attack does not require authentication or user interaction, though the attack complexity is considered high due to the need for specific cache failure conditions.

The vulnerability mechanism involves the cache response handling in nscd. When a netgroup query results in a not-found response, the daemon attempts to cache this negative result to avoid repeated lookups. If the addgrbyX cache function fails to properly allocate and initialize the response structure, subsequent code that expects valid data will dereference a null pointer. For detailed technical analysis, see the glibc Advisory GLIBC-SA-2024-0006.

Detection Methods for CVE-2024-33600

Indicators of Compromise

  • Unexpected nscd daemon crashes or restarts in system logs
  • Core dump files generated by nscd in /var/core/ or configured core dump directories
  • Spike in netgroup-related lookup failures across dependent services
  • System log entries indicating segmentation faults in nscd (e.g., kernel: nscd[PID]: segfault)

Detection Strategies

  • Monitor nscd process stability using process monitoring tools (systemd, monit, or custom scripts)
  • Configure auditd rules to track nscd crashes: auditctl -w /usr/sbin/nscd -p x -k nscd_monitor
  • Implement log correlation rules to detect repeated nscd restarts within short timeframes
  • Use SentinelOne's behavioral AI to detect anomalous daemon crash patterns indicative of exploitation attempts

Monitoring Recommendations

  • Enable core dump collection for nscd with appropriate disk space limits
  • Configure alerting on nscd service restarts via systemctl or init monitoring
  • Monitor /var/log/syslog and /var/log/messages for nscd-related error messages
  • Implement service availability monitoring for nscd on port 80 (if configured) or via socket status

How to Mitigate CVE-2024-33600

Immediate Actions Required

  • Update glibc to the latest patched version provided by your distribution
  • If immediate patching is not possible, consider disabling nscd netgroup caching as a temporary workaround
  • Implement service monitoring and automatic restart for nscd to minimize downtime during exploitation attempts
  • Review and apply vendor-specific patches from NetApp and Debian if using affected products

Patch Information

Security patches addressing this vulnerability are available from multiple sources. Refer to the following vendor advisories for specific patch information:

  • glibc Advisory GLIBC-SA-2024-0006 - Official glibc security advisory with patch details
  • Debian LTS Announcement - Debian Long Term Support security update
  • NetApp Security Advisory - NetApp product-specific patches

Update your system using the appropriate package manager for your distribution (e.g., apt update && apt upgrade for Debian-based systems).

Workarounds

  • Disable netgroup caching in nscd by setting enable-cache netgroup no in /etc/nscd.conf
  • Alternatively, disable nscd entirely if name service caching is not critical for your environment
  • Implement rate limiting on netgroup lookups if application architecture permits
  • Use alternative caching mechanisms such as sssd where applicable
bash
# Configuration example - Disable netgroup caching in nscd
# Edit /etc/nscd.conf and add or modify the following line:
echo "enable-cache netgroup no" >> /etc/nscd.conf

# Restart nscd to apply changes
systemctl restart nscd

# Verify the configuration is active
grep "enable-cache.*netgroup" /etc/nscd.conf

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechGnu Glibc

  • SeverityMEDIUM

  • CVSS Score5.9

  • EPSS Probability0.20%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Technical References
  • Openwall OSS Security Notice

  • Debian LTS Announcement

  • NetApp Security Advisory

  • glibc Advisory GLIBC-SA-2024-0006
  • Related CVEs
  • CVE-2026-0915

  • CVE-2025-5745

  • CVE-2025-5702

  • CVE-2025-4802

  • CVE-2024-33602

  • CVE-2024-33601

  • CVE-2024-33599
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use