SNIProxy.new_address.Stack.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in SNIProxy.
The vulnerability is due to lack of proper validation of the length of the Host header or SNI data prior to copying it to a fixed-length stack buffer. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP or TLS packet to the vulnerable server. Successful exploitation could result in execution of arbitrary code in the security context of the vulnerable service.
Affected Products
SNIProxy prior to 0.6.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/dlundquist/sniproxy/commit/f8d9a433fe22ab2fa15c00179048ab02ae23d583
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |