In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ntop/nDPI/commit/b7e666e465f138ae48ab81976726e67deed12701 | Patch Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2022/08/msg00016.html | Mailing List Third Party Advisory | 
Information
                Published : 2020-07-01 04:15
Updated : 2022-09-09 14:00
NVD link : CVE-2020-15472
Mitre link : CVE-2020-15472
JSON object : View
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
Products Affected
                debian
- debian_linux
 
ntop
- ndpi
 


