CVE-2018-16789

NameCVE-2018-16789
Descriptionlibhttp/url.c in shellinabox through 2.20 has an implementation flaw in the HTTP request parsing logic. By sending a crafted multipart/form-data HTTP request, an attacker could exploit this to force shellinaboxd into an infinite loop, exhausting available CPU resources and taking the service down.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
shellinabox (PTS)bookworm, bullseye, trixie2.21fixed
forky, sid2.21+really2.21-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
shellinaboxsource(unstable)2.21low

Notes

[stretch] - shellinabox <no-dsa> (Minor issue)
[jessie] - shellinabox <no-dsa> (Minor issue)
https://github.com/shellinabox/shellinabox/pull/446
https://github.com/shellinabox/shellinabox/commit/4f0ecc31ac6f985e0dd3f5a52cbfc0e9251f6361 (master)

Search for package or bug name: Reporting problems