The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
References
Link | Resource |
---|---|
https://airbus-seclab.github.io/advisories/netskope.html | Third Party Advisory |
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf | Permissions Required Release Notes Vendor Advisory |
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client | Permissions Required Vendor Advisory |
https://airbus-seclab.github.io/advisories/netskope.html | Third Party Advisory |
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf | Permissions Required Release Notes Vendor Advisory |
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client | Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://airbus-seclab.github.io/advisories/netskope.html - Third Party Advisory | |
References | () https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf - Permissions Required, Release Notes, Vendor Advisory | |
References | () https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client - Permissions Required, Vendor Advisory |
14 Sep 2021, 12:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 |
Information
Published : 2019-09-26 16:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10882
Mitre link : CVE-2019-10882
CVE.ORG link : CVE-2019-10882
JSON object : View
Products Affected
netskope
- netskope