Integer Overflow or Wraparound Affecting ndpi package, versions <3.4-1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.82% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-NDPI-5689902
  • published27 Apr 2020
  • disclosed23 Apr 2020

Introduced: 23 Apr 2020

CVE-2020-11939  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Debian:13 ndpi to version 3.4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ndpi package and not the ndpi package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.

CVSS Scores

version 3.1