Denial of service in OpenLiteSpeed



Published: 2018-12-28
Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID N/A
CWE-ID CWE-264
CWE-120
CWE-401
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
OpenLiteSpeed
Server applications / Web servers

Vendor LiteSpeed Technologies

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Denial of service

EUVDB-ID: #VU16747

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to unspecified flaw. A remote attacker can try to bind a in-use listening port and cause the server to crash.

Mitigation

Update to version 1.4.41.

Vulnerable software versions

OpenLiteSpeed: 1.4 - 1.4.40

External links

http://openlitespeed.org/release-log/version-1-4-x/#V1.4.41


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU16748

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to buffer overflow. A remote attacker can trigger memory corruption and cause the server to crash.

Mitigation

Update to version 1.4.41.

Vulnerable software versions

OpenLiteSpeed: 1.4 - 1.4.40

External links

http://openlitespeed.org/release-log/version-1-4-x/#V1.4.41


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU16749

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The weakness exists due to memory leak when reusing a ClientInfo object. A remote attacker can obtain potentially sensitive information or cause the server to crash.

Mitigation

Update to version 1.4.41.

Vulnerable software versions

OpenLiteSpeed: 1.4 - 1.4.40

External links

http://openlitespeed.org/release-log/version-1-4-x/#V1.4.41


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Denial of service

EUVDB-ID: #VU16750

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to unspecified flaw. A remote attacker can cause HTTP/2 and Spdy server to crash.

Mitigation

Update to version 1.4.41.

Vulnerable software versions

OpenLiteSpeed: 1.4 - 1.4.40

External links

http://openlitespeed.org/release-log/version-1-4-x/#V1.4.41


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###