CVE-2020-25219
09.09.2020, 21:15
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.Enginsight
Vendor | Product | Version |
---|---|---|
libproxy_project | libproxy | 0.4.0 ≤ 𝑥 ≤ 0.4.15 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
opensuse | leap | 15.1 |
opensuse | leap | 15.2 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 20.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References