CVE-2017-7458

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-7458
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-7458.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-7458
Downstream
Published
2017-06-26T23:29:00Z
Modified
2025-10-21T04:21:22.251152Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The NetworkInterface::getHost function in NetworkInterface.cpp in ntopng before 3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty field that should have contained a hostname or IP address.

References

Affected packages

Git / github.com/ntop/ntopng

Affected ranges

Type
GIT
Repo
https://github.com/ntop/ntopng
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*

2.4

Database specific

vanir_signatures

[
    {
        "target": {
            "file": "src/Lua.cpp",
            "function": "Lua::setParamsTable"
        },
        "id": "CVE-2017-7458-1c52cc06",
        "signature_type": "Function",
        "signature_version": "v1",
        "source": "https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f",
        "deprecated": false,
        "digest": {
            "function_hash": "45230076817017922627553868133652437512",
            "length": 1336.0
        }
    },
    {
        "target": {
            "file": "src/NetworkInterface.cpp"
        },
        "id": "CVE-2017-7458-2347328f",
        "signature_type": "Line",
        "signature_version": "v1",
        "source": "https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "160324394555210514509448589696142407848",
                "328260766068523010549289880788576980191",
                "41240477667630977198291149469061115489"
            ],
            "threshold": 0.9
        }
    },
    {
        "target": {
            "file": "src/Lua.cpp"
        },
        "id": "CVE-2017-7458-5e24b6ef",
        "signature_type": "Line",
        "signature_version": "v1",
        "source": "https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "106019805976255298140023834735704185255",
                "91127995900512789900064732114274950627",
                "35191940844274961326047896332125235340",
                "168078229102304722862558992609458552291"
            ],
            "threshold": 0.9
        }
    },
    {
        "target": {
            "file": "src/NetworkInterface.cpp",
            "function": "NetworkInterface::getHost"
        },
        "id": "CVE-2017-7458-98deda18",
        "signature_type": "Function",
        "signature_version": "v1",
        "source": "https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f",
        "deprecated": false,
        "digest": {
            "function_hash": "73783438478888607597439922526392775887",
            "length": 784.0
        }
    }
]