Описание
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
Ссылки
- PatchThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.2 (включая)
cpe:2.3:a:ntop:ndpi:*:*:*:*:*:*:*:*
EPSS
Процентиль: 68%
0.00559
Низкий
9.1 Critical
CVSS3
6.4 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 9.1
ubuntu
больше 5 лет назад
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVSS3: 9.1
debian
больше 5 лет назад
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-b ...
CVSS3: 9.1
github
больше 3 лет назад
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
EPSS
Процентиль: 68%
0.00559
Низкий
9.1 Critical
CVSS3
6.4 Medium
CVSS2
Дефекты
CWE-125