ID CVE-2020-25219
Summary url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
References
Vulnerable Configurations
  • cpe:2.3:a:libproxy_project:libproxy:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.13:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.13:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.14:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.14:*:*:*:*:*:*:*
  • cpe:2.3:a:libproxy_project:libproxy:0.4.15:*:*:*:*:*:*:*
    cpe:2.3:a:libproxy_project:libproxy:0.4.15:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 17-10-2020 - 12:15)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
fedora
  • FEDORA-2020-2407cb0512
  • FEDORA-2020-f92d372cf1
misc https://github.com/libproxy/libproxy/issues/134
mlist [debian-lts-announce] 20200912 [SECURITY] [DLA 2372-1] libproxy security update
ubuntu USN-4514-1
Last major update 17-10-2020 - 12:15
Published 09-09-2020 - 21:15
Last modified 17-10-2020 - 12:15
Back to Top