In FreeBSD 12.1-STABLE before r357213, 12.1-RELEASE before 12.1-RELEASE-p2, 12.0-RELEASE before 12.0-RELEASE-p13, 11.3-STABLE before r357214, and 11.3-RELEASE before 11.3-RELEASE-p6, URL handling in libfetch with URLs containing username and/or password components is vulnerable to a heap buffer overflow allowing program misbehavior or malicious code execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-28576 In FreeBSD 12.1-STABLE before r357213, 12.1-RELEASE before 12.1-RELEASE-p2, 12.0-RELEASE before 12.0-RELEASE-p13, 11.3-STABLE before r357214, and 11.3-RELEASE before 11.3-RELEASE-p6, URL handling in libfetch with URLs containing username and/or password components is vulnerable to a heap buffer overflow allowing program misbehavior or malicious code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2024-08-04T09:25:49.035Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7450

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-18T16:15:11.610

Modified: 2024-11-21T05:37:10.160

Link: CVE-2020-7450

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses