Логотип exploitDog
bind:CVE-2025-61770
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-61770

Количество 12

Количество 12

ubuntu логотип

CVE-2025-61770

6 месяцев назад

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-61770

6 месяцев назад

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-61770

6 месяцев назад

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-61770

6 месяцев назад

Rack is a modular Ruby web server interface. In versions prior to 2.2. ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-p543-xpfm-54cp

6 месяцев назад

Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-13875

6 месяцев назад

Уязвимость класса Rack::Multipart::Parser модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-21036

4 месяца назад

ELSA-2025-21036: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20962

4 месяца назад

ELSA-2025-20962: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19719

5 месяцев назад

ELSA-2025-19719: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19513

5 месяцев назад

ELSA-2025-19513: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19512

5 месяцев назад

ELSA-2025-19512: pcs security update (IMPORTANT)

EPSS: Низкий
redos логотип

ROS-20251106-03

5 месяцев назад

Множественные уязвимости rubygem-rack

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-61770

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-61770

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-61770

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-61770

Rack is a modular Ruby web server interface. In versions prior to 2.2. ...

CVSS3: 7.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-p543-xpfm-54cp

Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)

CVSS3: 7.5
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-13875

Уязвимость класса Rack::Multipart::Parser модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
6 месяцев назад
oracle-oval логотип
ELSA-2025-21036

ELSA-2025-21036: pcs security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-20962

ELSA-2025-20962: pcs security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-19719

ELSA-2025-19719: pcs security update (IMPORTANT)

5 месяцев назад
oracle-oval логотип
ELSA-2025-19513

ELSA-2025-19513: pcs security update (IMPORTANT)

5 месяцев назад
oracle-oval логотип
ELSA-2025-19512

ELSA-2025-19512: pcs security update (IMPORTANT)

5 месяцев назад
redos логотип
ROS-20251106-03

Множественные уязвимости rubygem-rack

CVSS3: 7.5
5 месяцев назад

Уязвимостей на страницу