cve/2023/CVE-2023-25076.md
2024-08-05 18:41:32 +00:00

19 lines
995 B
Markdown

### [CVE-2023-25076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25076)
![](https://img.shields.io/static/v1?label=Product&message=SNIProxy&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200.6.0-2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen)
### Description
A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731
#### Github
- https://github.com/DiRaltvein/memory-corruption-examples
- https://github.com/dlundquist/sniproxy