Vulnerabilities > CVE-2006-5876 - Remote Denial of Service vulnerability in Libsoup 2.2.98

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
libsoup
nessus

Summary

The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.

Vulnerable Configurations

Part Description Count
Application
Libsoup
1

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1248.NASL
    descriptionRoland Lezuo and Josselin Mouette discovered that the libsoup HTTP library performs insufficient sanitising when parsing HTTP headers, which might lead to denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id24025
    published2007-01-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24025
    titleDebian DSA-1248-1 : libsoup - missing input sanitising
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-1248. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(24025);
      script_version("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:20");
    
      script_cve_id("CVE-2006-5876");
      script_xref(name:"DSA", value:"1248");
    
      script_name(english:"Debian DSA-1248-1 : libsoup - missing input sanitising");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Roland Lezuo and Josselin Mouette discovered that the libsoup HTTP
    library performs insufficient sanitising when parsing HTTP headers,
    which might lead to denial of service."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405197"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2007/dsa-1248"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the libsoup package.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 2.2.3-2sarge1.
    
    For the upcoming stable distribution (etch) this problem has been
    fixed in version 2.2.98-2."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsoup");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/01/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/01/17");
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/01/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.1", prefix:"libsoup2.2-7", reference:"2.2.3-2sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"libsoup2.2-dev", reference:"2.2.3-2sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"libsoup2.2-doc", reference:"2.2.3-2sarge1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2007-029.NASL
    descriptionThe soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values. The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id24642
    published2007-02-18
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24642
    titleMandrake Linux Security Advisory : libsoup (MDKSA-2007:029)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_LIBSOUP-2503.NASL
    descriptionThis update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876)
    last seen2020-06-01
    modified2020-06-02
    plugin id27333
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27333
    titleopenSUSE 10 Security Update : libsoup (libsoup-2503)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-411-1.NASL
    descriptionRoland Lezuo and Josselin Mouette discovered that the HTTP server code in libsoup did not correctly verify request headers. Remote attackers could crash applications using libsoup by sending a crafted HTTP request, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id28000
    published2007-11-10
    reporterUbuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/28000
    titleUbuntu 5.10 / 6.06 LTS / 6.10 : libsoup vulnerability (USN-411-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_11401.NASL
    descriptionThis update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876)
    last seen2020-06-01
    modified2020-06-02
    plugin id41114
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41114
    titleSuSE9 Security Update : libsoup (YOU Patch Number 11401)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_11461.NASL
    descriptionThis update fixes a bug in the HTTP header parsing code of the included libsoup. This bug makes rcd vulnerable to a remote denial-of-service attack. (CVE-2006-5876)
    last seen2020-06-01
    modified2020-06-02
    plugin id41119
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41119
    titleSuSE9 Security Update : Red Carpet (YOU Patch Number 11461)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_LIBSOUP-2501.NASL
    descriptionThis update fixes a bug in the HTTP header parsing code. Applications using this library maybe vulnerable to a remote denial-of-service attack. (CVE-2006-5876)
    last seen2020-06-01
    modified2020-06-02
    plugin id29511
    published2007-12-13
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/29511
    titleSuSE 10 Security Update : libsoup (ZYPP Patch Number 2501)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-109.NASL
    descriptionUpdate to the latest libsoup 2.2 release. This release fixes a security flaw that causes the libsoup server to crash when it receives a malformed HTTP GET header. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id24298
    published2007-02-09
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24298
    titleFedora Core 6 : libsoup-2.2.99-1.fc6 (2007-109)

Statements

contributorMark J Cox
lastmodified2007-03-14
organizationRed Hat
statementNot vulnerable. The vulnerable code is not used by any application likned with libsoup shipped with Red Hat Enterprise Linux 2.1, 3, and 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.