Описание
A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests.
This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-built by vendor is not affected.
A denial of service flaw has been discovered in CivetWeb. The mg_handle_form_request function allows attackers to trigger a denial of service (DoS) condition by sending a specially crafted HTTP POST request containing a null byte in the payload. The server enters an infinite loop during form data parsing as a result. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests.
Отчет
On Red Hat systems a denial of service in the CivetWeb application does not pose a broader availability risk to the host.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Advanced Cluster Security 4 | advanced-cluster-security/rhacs-collector-slim-rhel8 | Not affected | ||
| Red Hat Advanced Cluster Security 4.7 | advanced-cluster-security/rhacs-collector-rhel8 | Fixed | RHSA-2025:23248 | 16.12.2025 |
| Red Hat Advanced Cluster Security 4.8 | advanced-cluster-security/rhacs-collector-rhel8 | Fixed | RHSA-2025:22179 | 26.11.2025 |
| Red Hat Advanced Cluster Security 4.9 | advanced-cluster-security/rhacs-collector-rhel8 | Fixed | RHSA-2025:21929 | 24.11.2025 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests. This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-built by vendor is not affected.
A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests. This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-built by vendor is not affected.
A vulnerability in the CivetWeb library's function mg_handle_form_requ ...
A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests. This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-built by vendor is not affected.
5.3 Medium
CVSS3