Learn about CVE-2020-15472, a heap-based buffer over-read vulnerability in nDPI through 3.2, allowing potential code execution. Find mitigation steps and preventive measures here.
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
Understanding CVE-2020-15472
This CVE identifies a vulnerability in the H.323 dissector in nDPI through version 3.2.
What is CVE-2020-15472?
The vulnerability in nDPI allows for a heap-based buffer over-read due to inadequate length validation in the H.323 dissector.
The Impact of CVE-2020-15472
The vulnerability could be exploited by an attacker to cause a denial of service or potentially execute arbitrary code on the affected system.
Technical Details of CVE-2020-15472
The technical aspects of the CVE provide insight into the specific details of the vulnerability.
Vulnerability Description
The vulnerability involves a heap-based buffer over-read in the ndpi_search_h323 function in lib/protocols/h323.c in nDPI.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by crafting a payload packet with a length that is too short, triggering the buffer over-read.
Mitigation and Prevention
Mitigation strategies and preventive measures to address CVE-2020-15472.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that the latest security updates and patches are applied to the nDPI software to mitigate the vulnerability.