Vulnerability Details : CVE-2009-4413
The httpClientDiscardBody function in client.c in Polipo 0.9.8, 0.9.12, 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a large Content-Length value, which triggers an integer overflow, a signed-to-unsigned conversion error with a negative value, and a segmentation fault.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2009-4413
- cpe:2.3:a:pps.jussieu:polipo:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:pps.jussieu:polipo:0.9.12:*:*:*:*:*:*:*
- cpe:2.3:a:pps.jussieu:polipo:1.0.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-4413
4.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-4413
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-4413
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-4413
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560779
#560779 - polipo: DoS via overly large "Content-Length" header - Debian Bug report logs
-
http://www.debian.org/security/2010/dsa-2002
[SECURITY] [DSA-2002-1] New polipo packages fix denial of service
-
http://www.securityfocus.com/bid/37463
-
http://www.openwall.com/lists/oss-security/2009/12/12/4
oss-security - CVE request: polipo DoS via overly large "Content-Length" header
-
http://www.exploit-db.com/exploits/10338
Polipo 1.0.4 - Remote Memory Corruption (PoC) - Linux dos Exploit
Jump to