CVE-2023-25076
CVSS V2 None
CVSS V3 None
Description
A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability.
Overview
- CVE ID
- CVE-2023-25076
- Assigner
- talos-cna@cisco.com
- Vulnerability Status
- Modified
- Published Version
- 2023-03-30T15:15:07
- Last Modified Date
- 2023-04-20T19:15:07
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:sniproxy_project:sniproxy:0.6.0-2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:sniproxy_project:sniproxy:0.6.1:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://github.com/dlundquist/sniproxy/commit/f8d9a433fe22ab2fa15c00179048ab02ae23d583 | Patch |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731 | Exploit Mitigation Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-25076 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25076 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:55:13 | Added to TrackCVE | |||
2023-04-17 03:55:16 | Weakness Enumeration | new | ||
2023-04-20 20:02:26 | 2023-04-20T19:15:07 | CVE Modified Date | updated | |
2023-04-20 20:02:26 | Analyzed | Modified | Vulnerability Status | updated |
2023-04-20 20:02:27 | A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP, TLS or DTLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability. | A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability. | Description | updated |