First published: Wed Sep 09 2020(Updated: )
libproxy is vulnerable to a denial of service, caused by an uncontrolled recursion in url::recvline in url.cpp. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause stack exhaustion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libproxy | <=0.4.15-13<=0.4.15-14<=0.4.15-5 | 0.4.15-15 0.4.15-5+deb10u1 |
ubuntu/libproxy | <0.4.15-1ubuntu0.1 | 0.4.15-1ubuntu0.1 |
ubuntu/libproxy | <0.4.15-10ubuntu1.1 | 0.4.15-10ubuntu1.1 |
ubuntu/libproxy | <0.4.11-5ubuntu1.1 | 0.4.11-5ubuntu1.1 |
debian/libproxy | 0.4.17-1 0.4.18-1.2 0.5.8-1 | |
IBM QRadar Security Information and Event Manager | <=7.5 - 7.5.0 UP9 IF03 | |
IBM Security QRadar Incident Forensics | <=7.5 - 7.5.0 UP9 IF03 | |
libproxy | >=0.4.0<=0.4.15 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =31 | |
Fedora | =32 | |
Fedora | =33 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25219 has a high severity rating due to its potential to cause denial of service through stack exhaustion.
To mitigate CVE-2020-25219, upgrade to libproxy version 0.4.17-1 or later, depending on your distribution.
CVE-2020-25219 affects libproxy versions 0.4.x up to 0.4.15, along with some IBM QRadar products running specific versions.
Exploitation of CVE-2020-25219 can lead to a denial of service, rendering the affected service unresponsive.
A temporary workaround for CVE-2020-25219 may include restricting access to the affected service until a patch is applied.