CVE-2023-27371

NameCVE-2023-27371
DescriptionGNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3374-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libmicrohttpd (PTS)buster0.9.62-1vulnerable
buster (security)0.9.62-1+deb10u1fixed
bullseye0.9.72-2vulnerable
bookworm0.9.75-6fixed
trixie1.0.0-2fixed
sid1.0.0-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libmicrohttpdsourcebuster0.9.62-1+deb10u1DLA-3374-1
libmicrohttpdsource(unstable)0.9.75-6

Notes

[bullseye] - libmicrohttpd <no-dsa> (Minor issue)
https://git.gnunet.org/libmicrohttpd.git/commit/?id=e0754d1638c602382384f1eface30854b1defeec (v0.9.76)
https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html

Search for package or bug name: Reporting problems