The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
References
Link | Resource |
---|---|
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf | Permissions Required Release Notes Vendor Advisory |
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client | Permissions Required Vendor Advisory |
https://airbus-seclab.github.io/advisories/netskope.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-09-26 09:15
Updated : 2021-09-14 05:09
NVD link : CVE-2019-10882
Mitre link : CVE-2019-10882
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
netskope
- netskope