The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-2604 | The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system. |
Fixes
Solution
Remediations were applied in R62 onwards and retrospectively applied in golden releases R60.2.0.214 and R57.2.0.219. Link to latest support golden releases - https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: airbus
Published:
Updated: 2024-09-16T23:00:47.885Z
Reserved: 2019-04-05T00:00:00
Link: CVE-2019-10882

No data.

Status : Modified
Published: 2019-09-26T16:15:10.737
Modified: 2024-11-21T04:20:02.540
Link: CVE-2019-10882

No data.

No data.