SB2019092725 - Multiple vulnerabilities in Netskope client service



SB2019092725 - Multiple vulnerabilities in Netskope client service

Published: September 27, 2019

Security Bulletin ID SB2019092725
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2019-10882)

The vulnerability allows a local user to cause a denial of service (DoS) attack on the target system.

The vulnerability exists due to a boundary error in the "doHandshakefromServer" function. A local authenticated user can trigger stack-based buffer overflow and crash the target application.

This vulnerability affects the following versions:

  • Netskope client v57 before 57.2.0.219
  • Netskope client v60 before 60.2.0.214


2) OS Command Injection (CVE-ID: CVE-2019-12091)

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the connection handling function. A local authenticated user can execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

This vulnerability affects the following versions:

  • Netskope client v57 before 57.2.0.219
  • Netskope client v60 before 60.2.0.214

Remediation

Install update from vendor's website.