A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice.
References
Link | Resource |
---|---|
https://github.com/cesanta/mongoose/issues/1135 | Issue Tracking Patch Third Party Advisory |
https://github.com/cesanta/mongoose/issues/1135 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cesanta/mongoose/issues/1135 - Issue Tracking, Patch, Third Party Advisory |
07 Nov 2023, 03:20
Type | Values Removed | Values Added |
---|---|---|
Summary | A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice. |
Information
Published : 2020-09-18 05:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25756
Mitre link : CVE-2020-25756
CVE.ORG link : CVE-2020-25756
JSON object : View
Products Affected
cesanta
- mongoose
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')