ID CVE-2009-4413
Summary The httpClientDiscardBody function in client.c in Polipo 0.9.8, 0.9.12, 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a large Content-Length value, which triggers an integer overflow, a signed-to-unsigned conversion error with a negative value, and a segmentation fault.
References
Vulnerable Configurations
  • cpe:2.3:a:pps.jussieu:polipo:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:pps.jussieu:polipo:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:pps.jussieu:polipo:0.9.12:*:*:*:*:*:*:*
    cpe:2.3:a:pps.jussieu:polipo:0.9.12:*:*:*:*:*:*:*
  • cpe:2.3:a:pps.jussieu:polipo:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:pps.jussieu:polipo:1.0.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 26-02-2010 - 07:10)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 37463
confirm http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560779
debian DSA-2002
exploit-db 10338
mlist [oss-security] 20091212 CVE request: polipo DoS via overly large "Content-Length" header
secunia
  • 37607
  • 38647
Last major update 26-02-2010 - 07:10
Published 24-12-2009 - 16:30
Last modified 26-02-2010 - 07:10
Back to Top