RSS   Vulnerabilities for 'NDPI'   RSS

2021-07-01
 
CVE-2021-36082

CWE-787
 

 
ntop nDPI 3.4 has a stack-based buffer overflow in processClientServerHello.

 
2020-07-01
 
CVE-2020-15475

CWE-416
 

 
In nDPI through 3.2, ndpi_reset_packet_line_info in lib/ndpi_main.c omits certain reinitialization, leading to a use-after-free.

 
 
CVE-2020-15474

CWE-787
 

 
In nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c.

 
 
CVE-2020-15473

CWE-125
 

 
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.

 
 
CVE-2020-15472

CWE-125
 

 
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.

 
 
CVE-2020-15471

CWE-125
 

 
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.

 
2020-04-23
 
CVE-2020-11939

CWE-190
 

 
In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.

 

 >>> Vendor: NTOP 4 Products
NTOP
Ntopng
NDIP
NDPI


Copyright 2024, cxsecurity.com

 

Back to Top