Stack-Based Buffer Overflow in ntop nDPI by ntop
CVE-2021-36082

8.8HIGH

Key Information:

Vendor

Ntop

Status
Vendor
CVE Published:
1 July 2021

What is CVE-2021-36082?

The ntop nDPI version 3.4 is susceptible to a stack-based buffer overflow due to improper processing in the function processClientServerHello. This vulnerability can potentially allow attackers to exploit memory corruption in the application, leading to unpredictable behavior, crashes, or arbitrary code execution. Proper remediation involves reviewing the code and applying patches as indicated by the ntop team.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.