Логотип exploitDog
bind:"BDU:2025-13875" OR bind:"CVE-2025-61770"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-13875" OR bind:"CVE-2025-61770"

Количество 11

Количество 11

fstec логотип

BDU:2025-13875

3 месяца назад

Уязвимость класса Rack::Multipart::Parser модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20251106-03

2 месяца назад

Множественные уязвимости rubygem-rack

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-61770

3 месяца назад

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-61770

3 месяца назад

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-61770

3 месяца назад

Rack is a modular Ruby web server interface. In versions prior to 2.2. ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-p543-xpfm-54cp

3 месяца назад

Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-21036

около 2 месяцев назад

ELSA-2025-21036: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20962

около 2 месяцев назад

ELSA-2025-20962: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19719

2 месяца назад

ELSA-2025-19719: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19513

2 месяца назад

ELSA-2025-19513: pcs security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19512

2 месяца назад

ELSA-2025-19512: pcs security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-13875

Уязвимость класса Rack::Multipart::Parser модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
3 месяца назад
redos логотип
ROS-20251106-03

Множественные уязвимости rubygem-rack

CVSS3: 7.5
2 месяца назад
ubuntu логотип
CVE-2025-61770

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-61770

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.

CVSS3: 7.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-61770

Rack is a modular Ruby web server interface. In versions prior to 2.2. ...

CVSS3: 7.5
0%
Низкий
3 месяца назад
github логотип
GHSA-p543-xpfm-54cp

Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)

CVSS3: 7.5
0%
Низкий
3 месяца назад
oracle-oval логотип
ELSA-2025-21036

ELSA-2025-21036: pcs security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-20962

ELSA-2025-20962: pcs security update (IMPORTANT)

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-19719

ELSA-2025-19719: pcs security update (IMPORTANT)

2 месяца назад
oracle-oval логотип
ELSA-2025-19513

ELSA-2025-19513: pcs security update (IMPORTANT)

2 месяца назад
oracle-oval логотип
ELSA-2025-19512

ELSA-2025-19512: pcs security update (IMPORTANT)

2 месяца назад

Уязвимостей на страницу