Vulnerability Details : CVE-2018-20578
Potential exploit
An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response.
Products affected by CVE-2018-20578
- cpe:2.3:a:nuttx:nuttx:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-20578
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-20578
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-20578
-
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-20578
-
https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt
Release Notes;Third Party Advisory
-
https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while
nuttx / NuttX / issues / #119 - Denial of Service (infinite loop) while processing maliciously crafted URLs — BitbucketExploit;Patch;Third Party Advisory
Jump to