CVE-2017-5850

httpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header.
References
Link Resource
http://marc.info/?l=openbsd-cvs&m=148587359420912&w=2 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/140944/OpenBSD-HTTP-Server-6.0-Denial-Of-Service.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Feb/15 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2017/02/02/6 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/95997 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037758 Third Party Advisory VDB Entry
https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/034_httpd.patch.sig Patch Vendor Advisory
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/017_httpd.patch.sig Patch Vendor Advisory
https://github.com/openbsd/src/commit/142cfc82b932bc211218fbd7bdda8c7ce83f19df Patch Third Party Advisory
https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html Exploit Patch Third Party Advisory
https://www.exploit-db.com/exploits/41278/ Exploit Patch Third Party Advisory VDB Entry
http://marc.info/?l=openbsd-cvs&m=148587359420912&w=2 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/140944/OpenBSD-HTTP-Server-6.0-Denial-Of-Service.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Feb/15 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2017/02/02/6 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/95997 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037758 Third Party Advisory VDB Entry
https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/034_httpd.patch.sig Patch Vendor Advisory
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/017_httpd.patch.sig Patch Vendor Advisory
https://github.com/openbsd/src/commit/142cfc82b932bc211218fbd7bdda8c7ce83f19df Patch Third Party Advisory
https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html Exploit Patch Third Party Advisory
https://www.exploit-db.com/exploits/41278/ Exploit Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:o:openbsd:openbsd:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://marc.info/?l=openbsd-cvs&m=148587359420912&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=openbsd-cvs&m=148587359420912&w=2 - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/140944/OpenBSD-HTTP-Server-6.0-Denial-Of-Service.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/140944/OpenBSD-HTTP-Server-6.0-Denial-Of-Service.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2017/Feb/15 - Third Party Advisory, VDB Entry () http://seclists.org/fulldisclosure/2017/Feb/15 - Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2017/02/02/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/02/02/6 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/95997 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95997 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037758 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037758 - Third Party Advisory, VDB Entry
References () https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/034_httpd.patch.sig - Patch, Vendor Advisory () https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/034_httpd.patch.sig - Patch, Vendor Advisory
References () https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/017_httpd.patch.sig - Patch, Vendor Advisory () https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/017_httpd.patch.sig - Patch, Vendor Advisory
References () https://github.com/openbsd/src/commit/142cfc82b932bc211218fbd7bdda8c7ce83f19df - Patch, Third Party Advisory () https://github.com/openbsd/src/commit/142cfc82b932bc211218fbd7bdda8c7ce83f19df - Patch, Third Party Advisory
References () https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html - Exploit, Patch, Third Party Advisory () https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html - Exploit, Patch, Third Party Advisory
References () https://www.exploit-db.com/exploits/41278/ - Exploit, Patch, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41278/ - Exploit, Patch, Third Party Advisory, VDB Entry

Information

Published : 2017-03-27 15:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5850

Mitre link : CVE-2017-5850

CVE.ORG link : CVE-2017-5850


JSON object : View

Products Affected

openbsd

  • openbsd
CWE
CWE-770

Allocation of Resources Without Limits or Throttling