Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
http://bugzilla.suse.com/show_bug.cgi?id=1122623 | issue tracking third party advisory |
http://www.securityfocus.com/bid/107367 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833 | issue tracking third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2V5HJ355RSKMFQ7GRJAHRZNDVXASF7TA/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B2HEZ7D7GF3HDF36JLGYXIK5URR66DS4/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CXQP7UDPRZIZ4LM7FEJCTC2EDUYVOR2J/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00006.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00065.html | mailing list third party advisory vendor advisory |