{"id":"CVE-2024-34244","details":"libmodbus v3.1.10 is vulnerable to Buffer Overflow via the modbus_write_bits function. This issue can be triggered when the function is fed with specially crafted input, which leads to out-of-bounds read and can potentially cause a crash or other unintended behaviors.","modified":"2026-03-14T12:33:41.655897Z","published":"2024-05-08T17:15:07.730Z","references":[{"type":"REPORT","url":"https://github.com/stephane/libmodbus/issues/743"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/stephane/libmodbus","events":[{"introduced":"0"},{"last_affected":"2cbafa3113e276c3697d297f68e88d112b53174d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.1.10"}]}}],"versions":["v1.2.2","v2.1.0","v2.9.1","v2.9.2","v2.9.3","v2.9.4","v3.0.0","v3.0.1","v3.1.0","v3.1.10","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.1.7","v3.1.8","v3.1.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-34244.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}