Learn about CVE-2020-15474, a stack overflow vulnerability in nDPI through version 3.2, allowing attackers to execute arbitrary code or cause denial of service. Find mitigation steps and updates here.
In nDPI through 3.2, a stack overflow vulnerability exists in extractRDNSequence in lib/protocols/tls.c.
Understanding CVE-2020-15474
What is CVE-2020-15474?
This CVE refers to a stack overflow issue found in the nDPI software through version 3.2.
The Impact of CVE-2020-15474
The vulnerability could allow an attacker to execute arbitrary code or cause a denial of service by triggering a stack overflow.
Technical Details of CVE-2020-15474
Vulnerability Description
The stack overflow occurs in the extractRDNSequence function within the tls.c file of nDPI version 3.2.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by crafting a malicious input that triggers the stack overflow in the extractRDNSequence function.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that the nDPI software is updated to version 3.3 or later to address the stack overflow vulnerability.