CVE-2023-25076

NameCVE-2023-25076
DescriptionA buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3406-1, DSA-5413-1
Debian Bugs1033752

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sniproxy (PTS)buster0.6.0-1vulnerable
buster (security)0.6.0-1+deb10u1fixed
bullseye (security), bullseye0.6.0-2+deb11u1fixed
bookworm0.6.0-2.1fixed
trixie, sid0.6.1+git20240321-0.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sniproxysourcebuster0.6.0-1+deb10u1DLA-3406-1
sniproxysourcebullseye0.6.0-2+deb11u1DSA-5413-1
sniproxysource(unstable)0.6.0-2.11033752

Notes

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731
https://github.com/dlundquist/sniproxy/commit/f8d9a433fe22ab2fa15c00179048ab02ae23d583 (0.6.1)

Search for package or bug name: Reporting problems