libfetch
Vulnerability details
A buffer overflow can occur during the parsing of a specially forged url, thus can lead to denial of service or the execution of custom arbitrary code.
Impacted products
Revisions
Version |
Date |
Description |
1 |
01/29/2020 |
Initial release |
2 |
02/26/2020 |
Fix typo |
3 |
05/15/2020 |
Fix version |
4 |
06/10/2020 |
Fix version |
Stormshield Network Security |
CVSS v2 Overall Score: 5.6
|
Analysis
|
Impacted version
|
An attacker can send a malicious url to a service in the UTM in order to cause a denial of service or run arbitrary code, but the service has reduced permissions on the system so the effects are limited.
|
- SNS 2.0.0 to 2.7.6
- SNS 2.8.0 to 2.15.0
- SNS 3.0.0 to 3.7.10
- SNS 3.8.0 to 3.10.0
- SNS 4.0.0 to 4.0.1
|
Workaround solution
|
Solution
|
There is no workaround solution.
|
The vulnerability is fixed in versions:
- SNS >= 2.7.7
- SNS >= 2.16.0
- SNS >= 3.7.11
- SNS >=3.10.1
- SNS >= 4.0.2
|
Access vector |
Access complexity |
Authentication |
Confidentiality impact |
Integrity impact |
Availability impact |
Network |
Low |
Single |
Complete |
None |
Partial |
Exploitability |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Confirmed |
Collateral Damage Potential |
Target Distribution |
None |
High [76-100%] |