Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-26154

Опубликовано: 16 июл. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.

Отчет

This vulnerability is rated as moderate because libproxy can overflow its buffer by PAC_HTTP_BLOCK_SIZE (512 bytes) if a server serving a PAC file sends more than 102400 bytes without a Content-Length header, specific conditions related to PAC file handling, and while it could lead to crashes or unexpected behavior, its overall impact is limited. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-121: Stack-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Access to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by stack-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques are used to ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against memory buffer overflows and denial-of-service attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libproxyNot affected
Red Hat Enterprise Linux 7libproxyNot affected
Red Hat Enterprise Linux 8libproxyFixedRHEA-2024:885205.11.2024
Red Hat Enterprise Linux 8libproxyFixedRHEA-2024:885205.11.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportlibproxyFixedRHSA-2024:620503.09.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1869639libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow

EPSS

Процентиль: 72%
0.00717
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.

CVSS3: 9.8
nvd
больше 5 лет назад

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.

CVSS3: 9.8
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 9.8
debian
больше 5 лет назад

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when ...

CVSS3: 9.8
github
больше 3 лет назад

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.

EPSS

Процентиль: 72%
0.00717
Низкий

7.5 High

CVSS3