Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-25219

Опубликовано: 09 сент. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

РелизСтатусПримечание
bionic

released

0.4.15-1ubuntu0.1
devel

released

0.4.15-13ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

0.4.15-1ubuntu0.1
esm-infra/focal

released

0.4.15-10ubuntu1.1
esm-infra/xenial

released

0.4.11-5ubuntu1.1
focal

released

0.4.15-10ubuntu1.1
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

EPSS

Процентиль: 69%
0.00587
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 5 лет назад

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

CVSS3: 7.5
nvd
больше 5 лет назад

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

CVSS3: 7.5
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 5 лет назад

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a rem ...

CVSS3: 7.5
github
больше 3 лет назад

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

EPSS

Процентиль: 69%
0.00587
Низкий

5 Medium

CVSS2

7.5 High

CVSS3