The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact on the system.
Solution:
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://support.netskope.com/hc/article_attachments/360033003553/Sprint_62_Release_Notes.pdf | release notes permissions required vendor advisory |
https://support.netskope.com/hc/en-us/articles/360014589894-Netskope-Client | permissions required vendor advisory |
https://airbus-seclab.github.io/advisories/netskope.html | third party advisory |