CVE-2020-11939

NameCVE-2020-11939
DescriptionIn nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs972050

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ndpi (PTS)stretch1.8-1fixed
stretch (security)1.8-1+deb9u1fixed
buster2.6-3fixed
sid3.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ndpisourcejessie(not affected)
ndpisourcestretch(not affected)
ndpisourcebuster(not affected)
ndpisource(unstable)(unfixed)972050

Notes

[buster] - ndpi <not-affected> (Introduced in 3.0)
[stretch] - ndpi <not-affected> (Introduced in 3.0)
[jessie] - ndpi <not-affected> (Introduced in 3.0)
https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202
https://securitylab.github.com/advisories/GHSL-2020-051_052-ntop-ndpi

Search for package or bug name: Reporting problems