Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1761

Опубликовано: 02 фев. 2026
Источник: redhat
CVSS3: 8.6

Описание

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

Отчет

This IMPORTANT flaw in libsoup involves a stack-based buffer overflow during the parsing of multipart HTTP responses. A remote attacker can exploit this vulnerability by sending a specially crafted response, leading to memory corruption and potentially arbitrary code execution or application crashes in Red Hat products that utilize libsoup to process untrusted server responses. This issue does not require authentication or user interaction.

Меры по смягчению последствий

To mitigate this issue, applications utilizing libsoup that process HTTP responses should be configured to only communicate with trusted endpoints. Implement network egress filtering to restrict vulnerable applications from connecting to untrusted external services, thereby reducing the exposure to specially crafted multipart HTTP responses.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libsoupOut of support scope
Red Hat Enterprise Linux 10libsoup3FixedRHSA-2026:218205.02.2026
Red Hat Enterprise Linux 10libsoup3FixedRHSA-2026:241010.02.2026
Red Hat Enterprise Linux 10.0 Extended Update Supportlibsoup3FixedRHSA-2026:200605.02.2026
Red Hat Enterprise Linux 7 Extended Lifecycle SupportlibsoupFixedRHSA-2026:262812.02.2026
Red Hat Enterprise Linux 8spice-client-winFixedRHSA-2026:221409.02.2026
Red Hat Enterprise Linux 8libsoupFixedRHSA-2026:221509.02.2026
Red Hat Enterprise Linux 8libsoupFixedRHSA-2026:221509.02.2026
Red Hat Enterprise Linux 8.2 Advanced Update SupportlibsoupFixedRHSA-2026:239610.02.2026
Red Hat Enterprise Linux 8.2 Advanced Update Supportspice-client-winFixedRHSA-2026:251311.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2435961libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 2 месяцев назад

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

CVSS3: 8.6
nvd
около 2 месяцев назад

A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.

CVSS3: 8.6
debian
около 2 месяцев назад

A flaw was found in libsoup. This stack-based buffer overflow vulnerab ...

suse-cvrf
30 дней назад

Security update for libsoup2

suse-cvrf
около 2 месяцев назад

Security update for libsoup2

8.6 High

CVSS3