Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-5440

Опубликовано: 09 апр. 2026
Источник: debian
EPSS Низкий

Описание

A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A crafted HTTP request containing an extremely large `Content-Length` value can trigger excessive memory allocation and server termination, even without sending a request body.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
orthancfixed1.12.10+dfsg-4package

Примечания

  • https://kb.cert.org/vuls/id/536588

  • https://orthanc.uclouvain.be/hg/orthanc/rev/5ce108190752

EPSS

Процентиль: 6%
0.00023
Низкий

Связанные уязвимости

ubuntu
5 дней назад

A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A crafted HTTP request containing an extremely large `Content-Length` value can trigger excessive memory allocation and server termination, even without sending a request body.

nvd
5 дней назад

A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A crafted HTTP request containing an extremely large `Content-Length` value can trigger excessive memory allocation and server termination, even without sending a request body.

github
5 дней назад

A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A crafted HTTP request containing an extremely large `Content-Length` value can trigger excessive memory allocation and server termination, even without sending a request body.

EPSS

Процентиль: 6%
0.00023
Низкий