Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-41101
HistoryNov 17, 2023 - 6:15 a.m.

CVE-2023-41101

2023-11-1706:15:34
Debian Security Bug Tracker
security-tracker.debian.org
9
opennds
captive portal
buffer overflow
get requests
stack-based
heap-based
denial-of-service
remote code execution
unix

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.004

Percentile

73.0%

An issue was discovered in the captive portal in OpenNDS before version 10.1.3. get_query in http_microhttpd.c does not validate the length of the query string of GET requests. This leads to a stack-based buffer overflow in versions 9.x and earlier, and to a heap-based buffer overflow in versions 10.x and later. Attackers may exploit the issue to crash OpenNDS (Denial-of-Service condition) or to inject and execute arbitrary bytecode (Remote Code Execution). Affected OpenNDS before version 10.1.3 fixed in OpenWrt master and OpenWrt 23.05 on 23. November by updating OpenNDS to version 10.2.0.

OSVersionArchitecturePackageVersionFilename
Debian12allopennds<= 9.10.0-1opennds_9.10.0-1_all.deb
Debian999allopennds< 10.2.0+dfsg-1opennds_10.2.0+dfsg-1_all.deb

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.004

Percentile

73.0%

Related for DEBIANCVE:CVE-2023-41101