An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response.
References
Link | Resource |
---|---|
https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt | Release Notes Third Party Advisory |
https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while | Exploit Patch Third Party Advisory |
https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt | Release Notes Third Party Advisory |
https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt - Release Notes, Third Party Advisory | |
References | () https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while - Exploit, Patch, Third Party Advisory |
Information
Published : 2018-12-28 18:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20578
Mitre link : CVE-2018-20578
CVE.ORG link : CVE-2018-20578
JSON object : View
Products Affected
nuttx
- nuttx
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')