{"api_version":"1","generated_at":"2026-05-06T21:38:42+00:00","cve":"CVE-2020-11939","urls":{"html":"https://cve.report/CVE-2020-11939","api":"https://cve.report/api/cve/CVE-2020-11939.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-11939","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-11939"},"summary":{"title":"CVE-2020-11939","description":"In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-04-23 15:15:00","updated_at":"2021-07-21 11:39:00"},"problem_types":["CWE-787","CWE-190"],"metrics":[],"references":[{"url":"https://securitylab.github.com/advisories/GHSL-2020-051_052-ntop-ndpi","name":"https://securitylab.github.com/advisories/GHSL-2020-051_052-ntop-ndpi","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"GHSL-2020-051, GHSL-2020-052: Multiple vulnerabilities in NTOP nDPI - GitHub Security Lab","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202","name":"https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"ssh: fixing unsigned overflow leading to heap overflow · ntop/nDPI@7ce478a · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-11939","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11939","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"11939","vulnerable":"1","versionEndIncluding":"3.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntop","cpe5":"ndpi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-11939","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202","refsource":"MISC","name":"https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202"},{"refsource":"MISC","name":"https://securitylab.github.com/advisories/GHSL-2020-051_052-ntop-ndpi","url":"https://securitylab.github.com/advisories/GHSL-2020-051_052-ntop-ndpi"}]}},"nvd":{"publishedDate":"2020-04-23 15:15:00","lastModifiedDate":"2021-07-21 11:39:00","problem_types":["CWE-787","CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntop:ndpi:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"11939","Ordinal":"173077","Title":"CVE-2020-11939","CVE":"CVE-2020-11939","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"11939","Ordinal":"1","NoteData":"In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory through remote input, this vulnerability may be abused to achieve full Remote Code Execution against any network inspection stack that is linked against nDPI and uses it to perform network traffic analysis.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"11939","Ordinal":"2","NoteData":"2020-04-23","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"11939","Ordinal":"3","NoteData":"2020-04-23","Type":"Other","Title":"Modified"}]}}}