First published: Fri Dec 28 2018(Updated: )
An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NuttX | <7.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20578 is classified as a Denial of Service (DoS) vulnerability due to its infinite loop condition.
To mitigate CVE-2018-20578, upgrade NuttX to version 7.27 or later that implements a fix for this issue.
An attacker can exploit CVE-2018-20578 by sending a specially crafted Location header in an HTTP request, which leads to an infinite loop.
CVE-2018-20578 affects NuttX versions prior to 7.27.
While upgrading is the best solution for CVE-2018-20578, limiting input size for URL handling could serve as a temporary mitigation.