The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
References
Link | Resource |
---|---|
https://airbus-seclab.github.io/advisories/netskope.html | Third Party Advisory |
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf | Permissions Required Release Notes Vendor Advisory |
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client | Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-09-26 16:15
Updated : 2021-09-14 12:09
NVD link : CVE-2019-10882
Mitre link : CVE-2019-10882
CVE.ORG link : CVE-2019-10882
JSON object : View
Products Affected
netskope
- netskope