Vulnerabilities > CVE-2006-5876 - Remote Denial of Service vulnerability in Libsoup 2.2.98
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
COMPLETE Summary
The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1248.NASL description Roland Lezuo and Josselin Mouette discovered that the libsoup HTTP library performs insufficient sanitising when parsing HTTP headers, which might lead to denial of service. last seen 2020-06-01 modified 2020-06-02 plugin id 24025 published 2007-01-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24025 title Debian DSA-1248-1 : libsoup - missing input sanitising code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-1248. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(24025); script_version("1.16"); script_cvs_date("Date: 2019/08/02 13:32:20"); script_cve_id("CVE-2006-5876"); script_xref(name:"DSA", value:"1248"); script_name(english:"Debian DSA-1248-1 : libsoup - missing input sanitising"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Roland Lezuo and Josselin Mouette discovered that the libsoup HTTP library performs insufficient sanitising when parsing HTTP headers, which might lead to denial of service." ); script_set_attribute( attribute:"see_also", value:"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405197" ); script_set_attribute( attribute:"see_also", value:"http://www.debian.org/security/2007/dsa-1248" ); script_set_attribute( attribute:"solution", value: "Upgrade the libsoup package. For the stable distribution (sarge) this problem has been fixed in version 2.2.3-2sarge1. For the upcoming stable distribution (etch) this problem has been fixed in version 2.2.98-2." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsoup"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.1"); script_set_attribute(attribute:"patch_publication_date", value:"2007/01/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/01/17"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/01/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"3.1", prefix:"libsoup2.2-7", reference:"2.2.3-2sarge1")) flag++; if (deb_check(release:"3.1", prefix:"libsoup2.2-dev", reference:"2.2.3-2sarge1")) flag++; if (deb_check(release:"3.1", prefix:"libsoup2.2-doc", reference:"2.2.3-2sarge1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-029.NASL description The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values. The updated packages have been patched to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 24642 published 2007-02-18 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24642 title Mandrake Linux Security Advisory : libsoup (MDKSA-2007:029) NASL family SuSE Local Security Checks NASL id SUSE_LIBSOUP-2503.NASL description This update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876) last seen 2020-06-01 modified 2020-06-02 plugin id 27333 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27333 title openSUSE 10 Security Update : libsoup (libsoup-2503) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-411-1.NASL description Roland Lezuo and Josselin Mouette discovered that the HTTP server code in libsoup did not correctly verify request headers. Remote attackers could crash applications using libsoup by sending a crafted HTTP request, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 28000 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28000 title Ubuntu 5.10 / 6.06 LTS / 6.10 : libsoup vulnerability (USN-411-1) NASL family SuSE Local Security Checks NASL id SUSE9_11401.NASL description This update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876) last seen 2020-06-01 modified 2020-06-02 plugin id 41114 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41114 title SuSE9 Security Update : libsoup (YOU Patch Number 11401) NASL family SuSE Local Security Checks NASL id SUSE9_11461.NASL description This update fixes a bug in the HTTP header parsing code of the included libsoup. This bug makes rcd vulnerable to a remote denial-of-service attack. (CVE-2006-5876) last seen 2020-06-01 modified 2020-06-02 plugin id 41119 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41119 title SuSE9 Security Update : Red Carpet (YOU Patch Number 11461) NASL family SuSE Local Security Checks NASL id SUSE_LIBSOUP-2501.NASL description This update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876) last seen 2020-06-01 modified 2020-06-02 plugin id 29511 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29511 title SuSE 10 Security Update : libsoup (ZYPP Patch Number 2501) NASL family Fedora Local Security Checks NASL id FEDORA_2007-109.NASL description Update to the latest libsoup 2.2 release. This release fixes a security flaw that causes the libsoup server to crash when it receives a malformed HTTP GET header. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 24298 published 2007-02-09 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/24298 title Fedora Core 6 : libsoup-2.2.99-1.fc6 (2007-109)
Statements
contributor | Mark J Cox |
lastmodified | 2007-03-14 |
organization | Red Hat |
statement | Not vulnerable. The vulnerable code is not used by any application likned with libsoup shipped with Red Hat Enterprise Linux 2.1, 3, and 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
References
- http://fedoranews.org/cms/node/2509
- http://ftp.gnome.org/pub/gnome/sources/libsoup/2.2/libsoup-2.2.99.news
- http://osvdb.org/31667
- http://secunia.com/advisories/23734
- http://secunia.com/advisories/23770
- http://secunia.com/advisories/23871
- http://secunia.com/advisories/23873
- http://secunia.com/advisories/23961
- http://secunia.com/advisories/23976
- http://www.debian.org/security/2007/dsa-1248
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:029
- http://www.securityfocus.com/bid/22034
- http://www.ubuntu.com/usn/usn-411-1
- http://www.vupen.com/english/advisories/2007/0173
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31519
- https://issues.rpath.com/browse/RPL-965