Vulnerability Details : CVE-2020-36617
A vulnerability was found in ewxrjk sftpserver. It has been declared as problematic. Affected by this vulnerability is the function sftp_parse_path of the file parse.c. The manipulation leads to uninitialized pointer. The real existence of this vulnerability is still doubted at the moment. The name of the patch is bf4032f34832ee11d79aa60a226cc018e7ec5eed. It is recommended to apply a patch to fix this issue. The identifier VDB-216205 was assigned to this vulnerability. NOTE: In some deployment models this would be a vulnerability. README specifically warns about avoiding such deployment models.
Products affected by CVE-2020-36617
- cpe:2.3:a:greenend:sftpserver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36617
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36617
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L |
1.2
|
3.4
|
VulDB | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-36617
-
The product accesses or uses a pointer that has not been initialized.Assigned by: cna@vuldb.com (Primary)
-
The product uses or accesses a resource that has not been initialized.Assigned by: cna@vuldb.com (Primary)
References for CVE-2020-36617
-
https://vuldb.com/?id.216205
CVE-2020-36617 | ewxrjk sftpserver parse.c sftp_parse_path uninitialized pointerThird Party Advisory
-
https://github.com/ewxrjk/sftpserver/commit/bf4032f34832ee11d79aa60a226cc018e7ec5eed
Fix handle mis-parse · ewxrjk/sftpserver@bf4032f · GitHubPatch;Third Party Advisory
Jump to