Vulnerability Description
In FreeBSD 12.1-STABLE before r357213, 12.1-RELEASE before 12.1-RELEASE-p2, 12.0-RELEASE before 12.0-RELEASE-p13, 11.3-STABLE before r357214, and 11.3-RELEASE before 11.3-RELEASE-p6, URL handling in libfetch with URLs containing username and/or password components is vulnerable to a heap buffer overflow allowing program misbehavior or malicious code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 11.3 |
Related Weaknesses (CWE)
References
- https://security.FreeBSD.org/advisories/FreeBSD-SA-20:01.libfetch.ascPatchVendor Advisory
- https://security.FreeBSD.org/advisories/FreeBSD-SA-20:01.libfetch.ascPatchVendor Advisory
FAQ
What is CVE-2020-7450?
CVE-2020-7450 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In FreeBSD 12.1-STABLE before r357213, 12.1-RELEASE before 12.1-RELEASE-p2, 12.0-RELEASE before 12.0-RELEASE-p13, 11.3-STABLE before r357214, and 11.3-RELEASE before 11.3-RELEASE-p6, URL handling in l...
How severe is CVE-2020-7450?
CVE-2020-7450 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-7450?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.