Vulnerabilities > CVE-2018-10243 - Out-of-bounds Read vulnerability in Oisf Libhtp 0.5.26
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Overread Buffers An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DLA-1751.NASL |
description | Multiple vulnerabilities have been found in suricata, the network threat detection engine : CVE-2018-10242 Missing length check causing out-of-bounds read in SSHParseBanner (app-layer-ssh.c). Remote attackers might leverage this vulnerability to cause DoS or potentially unauthorized disclosure of information. CVE-2018-10243 Unexpected end of Authorization field causing heap-based buffer over-read in htp_parse_authorization_digest (htp_parsers.c, from the embedded copy of LibHTP). Remote attackers might leverage this vulnerability to cause DoS or potentially unauthorized disclosure of information. For Debian 8 |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 123832 |
published | 2019-04-09 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/123832 |
title | Debian DLA-1751-1 : suricata security update |
code |
|