Vulnerability identifier: #VU18826
Vulnerability risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
GoAhead
Server applications /
Web servers
Vendor: EmbedThis
Description
The vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to memory assertion when processing HTTP headers in http.c file. A remote unauthenticated attacker can send a specially crafted HTTP request and consume all available resources, resulting in a denial of service attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
GoAhead: 2.1.5 - 5.0.0
External links
https://github.com/embedthis/goahead/compare/5349710...579f21f
https://github.com/embedthis/goahead/issues/285
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.