CVE Vulnerabilities

CVE-2020-25219

Uncontrolled Recursion

Published: Sep 09, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
LibproxyLibproxy_project0.4.0 (including)0.4.15 (including)
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatlibproxy-0:0.4.15-5.4.el8_8*
LibproxyUbuntubionic*
LibproxyUbuntudevel*
LibproxyUbuntuesm-infra/bionic*
LibproxyUbuntuesm-infra/focal*
LibproxyUbuntuesm-infra/xenial*
LibproxyUbuntufocal*
LibproxyUbuntutrusty*
LibproxyUbuntuxenial*

Potential Mitigations

References