Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000098

Опубликовано: 01 дек. 2016
Источник: redhat
CVSS3: 5.9
CVSS2: 4.3
EPSS Низкий

Описание

The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 3golangNot affected
Red Hat OpenStack Platform 10 (Newton) Operational ToolsgolangNot affected
Red Hat OpenStack Platform 8 (Liberty) Operational ToolsgolangWill not fix
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolsgolangWill not fix
Red Hat Enterprise Linux 7golangFixedRHSA-2017:185901.08.2017

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1401985golang: net/http: multipart ReadForm close file after copy

EPSS

Процентиль: 62%
0.00434
Низкий

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.

CVSS3: 7.5
nvd
больше 8 лет назад

The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.

CVSS3: 7.5
debian
больше 8 лет назад

The net/http package's Request.ParseMultipartForm method starts writin ...

CVSS3: 7.5
github
больше 3 лет назад

The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.

EPSS

Процентиль: 62%
0.00434
Низкий

5.9 Medium

CVSS3

4.3 Medium

CVSS2