CVE-2018-20578

An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nuttx:nuttx:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt - Release Notes, Third Party Advisory () https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt - Release Notes, Third Party Advisory
References () https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while - Exploit, Patch, Third Party Advisory () https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while - Exploit, Patch, Third Party Advisory

Information

Published : 2018-12-28 18:29

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20578

Mitre link : CVE-2018-20578

CVE.ORG link : CVE-2018-20578


JSON object : View

Products Affected

nuttx

  • nuttx
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')