Learn about CVE-2020-11939, a critical vulnerability in nDPI through 3.2 Stable allowing for remote heap overflow and potential Remote Code Execution. Find mitigation steps and prevention measures.
In nDPI through 3.2 Stable, a vulnerability exists in the SSH protocol dissector that allows for a remote heap overflow, potentially leading to Remote Code Execution.
Understanding CVE-2020-11939
This CVE describes a critical vulnerability in the nDPI library that can be exploited to achieve full Remote Code Execution on network inspection stacks.
What is CVE-2020-11939?
The vulnerability in the SSH protocol dissector in nDPI through version 3.2 Stable allows for controlled remote heap overflow, posing a significant security risk.
The Impact of CVE-2020-11939
The ability to control the contents and layout of the nDPI library's heap memory through remote input can lead to full Remote Code Execution on any network inspection stack linked against nDPI.
Technical Details of CVE-2020-11939
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The SSH protocol dissector in nDPI through version 3.2 Stable suffers from multiple KEXINIT integer overflows, resulting in a controlled remote heap overflow in concat_hash_string in ssh.c.
Affected Systems and Versions
Exploitation Mechanism
The granular nature of the overflow primitive and the ability to control both contents and layout of the nDPI library's heap memory through remote input enable attackers to exploit this vulnerability for Remote Code Execution.
Mitigation and Prevention
Protecting systems from CVE-2020-11939 requires immediate action and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that the nDPI library is updated to a secure version that addresses the SSH protocol dissector vulnerability.