First published: Fri May 17 2019(Updated: )
The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
Credit: cert@airbus.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netskope | >=57<57.2.0.219 | |
Netskope | >=60<60.2.0.214 |
Remediations were applied in R62 onwards and retrospectively applied in golden releases R60.2.0.214 and R57.2.0.219. Link to latest support golden releases - https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10882 is a vulnerability in the Netskope client service, versions 57 before 57.2.0.219 and v60 before 60.2.0.214, that allows local users to trigger a stack-based buffer overflow.
CVE-2019-10882 has a severity score of 7.8 (high).
Netskope client service versions 57 before 57.2.0.219 and v60 before 60.2.0.214 are affected by CVE-2019-10882.
The CWE IDs for CVE-2019-10882 are 119, 787, and 120.
You can find more information about CVE-2019-10882 and how to fix it in the references provided: [Link 1](https://airbus-seclab.github.io/advisories/netskope.html), [Link 2](https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf), [Link 3](https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client).