An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response.
References
Link | Resource |
---|---|
https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while | Exploit Patch Third Party Advisory |
https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt | Release Notes Third Party Advisory |
Configurations
Information
Published : 2018-12-28 10:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-20578
Mitre link : CVE-2018-20578
JSON object : View
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
Products Affected
nuttx
- nuttx