CVE-2023-34188

NameCVE-2023-34188
DescriptionThe HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers. By sending a single attack payload over TCP, an attacker can cause an infinite loop in which the server continuously reparses that payload, and does not respond to any other requests.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mongoose (PTS)forky, sid7.21+ds-2fixed
swupdate (PTS)bullseye2020.11-2+deb11u1vulnerable
bookworm2022.12+dfsg-4+deb12u2vulnerable
trixie2024.12.1+dfsg-3+deb13u2fixed
forky, sid2025.12+dfsg-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mongoosesource(unstable)(not affected)
swupdatesource(unstable)2024.12+dfsg-1

Notes

- mongoose <not-affected> (Fixed before or with initial upload)
[bookworm] - swupdate <no-dsa> (Minor issue)
[bullseye] - swupdate <postponed> (Minor issue)
https://github.com/cesanta/mongoose/commit/4663090a8fb036146dfe77718cff612b0101cb0f (7.10)
smplayer embeds a copy, which is unused in any released version and disabled since 18.5.0~ds1-1

Search for package or bug name: Reporting problems