Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6j8r-j98h-9g9f

Опубликовано: 02 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

EPSS

Процентиль: 63%
0.00455
Низкий

8.6 High

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 8.6
ubuntu
6 дней назад

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

CVSS3: 8.6
nvd
6 дней назад

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

CVSS3: 8.6
debian
6 дней назад

A flaw was found in libsoup. This stack-based buffer overflow vulnerab ...

oracle-oval
4 дня назад

ELSA-2026-2182: libsoup3 security update (IMPORTANT)

EPSS

Процентиль: 63%
0.00455
Низкий

8.6 High

CVSS3

Дефекты

CWE-121