9.8
CVSSv3

CVE-2023-41101

Published: 17/11/2023 Updated: 25/11/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An issue exists in the captive portal in OpenNDS before version 10.1.3. get_query in http_microhttpd.c does not validate the length of the query string of GET requests. This leads to a stack-based buffer overflow in versions 9.x and previous versions, and to a heap-based buffer overflow in versions 10.x and later. Attackers may exploit the issue to crash OpenNDS (Denial-of-Service condition) or to inject and execute arbitrary bytecode (Remote Code Execution).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opennds opennds

Vendor Advisories

Debian Bug report logs - #1059452 opennds: CVE-2023-41101 CVE-2023-41102 Package: src:opennds; Maintainer for src:opennds is Debian Edu Packaging Team <debian-edu-pkg-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 25 Dec 2023 21:57:14 UTC Severity: important Tags: secu ...