Логотип exploitDog
bind:"BDU:2025-14431" OR bind:"CVE-2025-61772"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-14431" OR bind:"CVE-2025-61772"

Количество 10

Количество 10

fstec логотип

BDU:2025-14431

около 2 месяцев назад

Уязвимость класса Rack::Multipart::Parser модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-61772

около 2 месяцев назад

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS). Attackers can send incomplete multipart headers to trigger high memory use, leading to process termination (OOM) or severe slowdown. The effect scales with request size limits and concurrency. All applications handling multipart uploads may be affected. Versions 2.2.19, 3.1.17, and 3.2.2 cap per-part header size (e.g., 64 KiB). As a workaround, restrict maximum request sizes at the proxy or web server layer (e.g., Nginx `client_max_body_size`).

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-61772

около 2 месяцев назад

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS). Attackers can send incomplete multipart headers to trigger high memory use, leading to process termination (OOM) or severe slowdown. The effect scales with request size limits and concurrency. All applications handling multipart uploads may be affected. Versions 2.2.19, 3.1.17, and 3.2.2 cap per-part header size (e.g., 64 KiB). As a workaround, restrict maximum request sizes at the proxy or web server layer (e.g., Nginx `client_max_body_size`).

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-61772

около 2 месяцев назад

Rack is a modular Ruby web server interface. In versions prior to 2.2. ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-wpv5-97wm-hp9c

около 2 месяцев назад

Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion)

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20251106-03

25 дней назад

Множественные уязвимости rubygem-rack

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20962

6 дней назад

ELSA-2025-20962: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19719

25 дней назад

ELSA-2025-19719: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19513

24 дня назад

ELSA-2025-19513: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19512

28 дней назад

ELSA-2025-19512: pcs security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-14431

Уязвимость класса Rack::Multipart::Parser модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-61772

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS). Attackers can send incomplete multipart headers to trigger high memory use, leading to process termination (OOM) or severe slowdown. The effect scales with request size limits and concurrency. All applications handling multipart uploads may be affected. Versions 2.2.19, 3.1.17, and 3.2.2 cap per-part header size (e.g., 64 KiB). As a workaround, restrict maximum request sizes at the proxy or web server layer (e.g., Nginx `client_max_body_size`).

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-61772

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS). Attackers can send incomplete multipart headers to trigger high memory use, leading to process termination (OOM) or severe slowdown. The effect scales with request size limits and concurrency. All applications handling multipart uploads may be affected. Versions 2.2.19, 3.1.17, and 3.2.2 cap per-part header size (e.g., 64 KiB). As a workaround, restrict maximum request sizes at the proxy or web server layer (e.g., Nginx `client_max_body_size`).

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-61772

Rack is a modular Ruby web server interface. In versions prior to 2.2. ...

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-wpv5-97wm-hp9c

Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion)

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
redos логотип
ROS-20251106-03

Множественные уязвимости rubygem-rack

CVSS3: 7.5
25 дней назад
oracle-oval логотип
ELSA-2025-20962

ELSA-2025-20962: pcs security update (IMPORTANT)

6 дней назад
oracle-oval логотип
ELSA-2025-19719

ELSA-2025-19719: pcs security update (IMPORTANT)

25 дней назад
oracle-oval логотип
ELSA-2025-19513

ELSA-2025-19513: pcs security update (IMPORTANT)

24 дня назад
oracle-oval логотип
ELSA-2025-19512

ELSA-2025-19512: pcs security update (IMPORTANT)

28 дней назад

Уязвимостей на страницу