In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2020-04-23T14:18:36
Updated: 2024-08-04T11:42:00.826Z
Reserved: 2020-04-20T00:00:00
Link: CVE-2020-11939
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Modified
Published: 2020-04-23T15:15:14.093
Modified: 2024-11-21T04:58:56.630
Link: CVE-2020-11939
 Redhat
                        Redhat
                    No data.