CVE-2020-25219 — Uncontrolled Recursion in Project Libproxy
Severity
7.5HIGHNVD
EPSS
0.4%
top 36.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 9
Latest updateMay 24
Description
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 31, 32, 33, Ubuntu Linux 16.04, 18.04, 20.04
🔴Vulnerability Details
3📋Vendor Advisories
4Red Hat▶
libproxy: uncontrolled recursion via an infinite stream response leading to stack exhaustion↗2020-09-09
Microsoft▶
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. Th↗2020-09-08
Debian▶
CVE-2020-25219: libproxy - url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP s...↗2020