Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3833

Опубликовано: 14 мар. 2019
Источник: debian
EPSS Низкий

Описание

Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openwsmanitppackage

EPSS

Процентиль: 88%
0.04069
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.

CVSS3: 7.5
redhat
больше 6 лет назад

Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.

CVSS3: 7.5
nvd
больше 6 лет назад

Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

rocky
больше 4 лет назад

Moderate: openwsman security update

EPSS

Процентиль: 88%
0.04069
Низкий