CVE-2020-11939

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-11939
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11939.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-11939
Related
Published
2020-04-23T15:15:14Z
Modified
2025-01-15T01:42:26.212006Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concathashstring in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.

References

Affected packages

Debian:12 / ndpi

Package

Name
ndpi
Purl
pkg:deb/debian/ndpi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ndpi

Package

Name
ndpi
Purl
pkg:deb/debian/ndpi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/ntop/ndpi

Affected ranges

Type
GIT
Repo
https://github.com/ntop/ndpi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.6
1.7
1.8