Vulnerabilities > CVE-2020-10739 - NULL Pointer Dereference vulnerability in Istio

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
istio
CWE-476
nessus

Summary

Istio 1.4.x before 1.4.9 and Istio 1.5.x before 1.5.4 contain the following vulnerability when telemetry v2 is enabled: by sending a specially crafted packet, an attacker could trigger a Null Pointer Exception resulting in a Denial of Service. This could be sent to the ingress gateway or a sidecar, triggering a null pointer exception which results in a denial of service. This also affects servicemesh-proxy where a null pointer exception flaw was found in servicemesh-proxy. When running Telemetry v2 (not on by default in version 1.4.x), an attacker could send a specially crafted packet to the ingress gateway or proxy sidecar, triggering a denial of service.

Common Weakness Enumeration (CWE)

Nessus

NASL familyRed Hat Local Security Checks
NASL idREDHAT-RHSA-2020-2148.NASL
descriptionThe remote Redhat Enterprise Linux 8 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2020:2148 advisory. - istio/envoy: crafted packet allows remote attacker to cause denial of service (CVE-2020-10739) Note that Nessus has not tested for this issue but has instead relied only on the application
last seen2020-06-04
modified2020-05-14
plugin id136586
published2020-05-14
reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/136586
titleRHEL 8 : Red Hat OpenShift Service Mesh 1.1.2 Service Mesh Proxy (RHSA-2020:2148)

Redhat

rpmsservicemesh-proxy-0:1.1.2-2.el8