Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-31808

Опубликовано: 10 мар. 2026
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A flaw was found in file-type, a library for detecting file types. A remote attacker can exploit this by providing a specially crafted ASF (Advanced Systems Format) file. When parsing the file, a zero-sized sub-header can trigger an infinite loop, leading to a Denial of Service (DoS). This can stall the Node.js event loop, preventing the application from processing further requests.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4io.cryostat-cryostatFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel9Fix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-operator-bundleFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-proxy-rhel9Fix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel9-operatorFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Fix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-curator5-rhel9Fix deferred
Red Hat build of Apicurio Registry 2io.apicurio-apicurio-registryFix deferred
Red Hat Data Grid 8org.infinispan-infinispan-consoleFix deferred
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=2446309file-type: file-type: Denial of Service due to infinite loop in ASF file parsing

EPSS

Процентиль: 8%
0.00028
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
17 дней назад

file-type detects the file type of a file, stream, or data. Prior to 21.3.1, a denial of service vulnerability exists in the ASF (WMV/WMA) file type detection parser. When parsing a crafted input where an ASF sub-header has a size field of zero, the parser enters an infinite loop. The payload value becomes negative (-24), causing tokenizer.ignore(payload) to move the read position backwards, so the same sub-header is read repeatedly forever. Any application that uses file-type to detect the type of untrusted/attacker-controlled input is affected. An attacker can stall the Node.js event loop with a 55-byte payload. Fixed in version 21.3.1.

CVSS3: 5.3
github
16 дней назад

file-type affected by infinite loop in ASF parser on malformed input with zero-size sub-header

EPSS

Процентиль: 8%
0.00028
Низкий

5.3 Medium

CVSS3