CVE-2020-15474

NameCVE-2020-15474
DescriptionIn nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs972050

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ndpi (PTS)stretch1.8-1fixed
stretch (security)1.8-1+deb9u1fixed
buster2.6-3fixed
sid3.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ndpisourcestretch(not affected)
ndpisourcebuster(not affected)
ndpisource(unstable)(unfixed)972050

Notes

[buster] - ndpi <not-affected> (Vulnerable code not present)
[stretch] - ndpi <not-affected> (Vulnerable code not present)
https://github.com/ntop/nDPI/commit/23594f036536468072198a57c59b6e9d63caf6ce

Search for package or bug name: Reporting problems