Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-32239

Опубликовано: 12 мар. 2026
Источник: debian
EPSS Низкий

Описание

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
capnprotofixed1.4.0-1experimentalpackage
capnprotofixed1.4.0-2package

Примечания

  • https://github.com/capnproto/capnproto/security/advisories/GHSA-qjx3-pp3m-9jpm

  • Fixed by: https://github.com/capnproto/capnproto/commit/2744b3c012b4aa3c31cefb61ec656829fa5c0e36 (v1.4.0)

EPSS

Процентиль: 23%
0.00077
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
15 дней назад

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

CVSS3: 4.8
redhat
15 дней назад

A flaw was found in the KJ-HTTP component of Cap’n Proto. When processing HTTP messages, a negative Content-Length value could be implicitly converted to an unsigned integer, resulting in an extremely large length value. An attacker could exploit this behavior by sending specially crafted HTTP messages containing negative Content-Length values. This may lead to inconsistent interpretation of HTTP message boundaries and could theoretically enable HTTP request or response smuggling scenarios in applications that rely on Cap’n Proto’s HTTP implementation.

CVSS3: 6.5
nvd
15 дней назад

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

EPSS

Процентиль: 23%
0.00077
Низкий