发布于3月6日3月6日 Members Oracle Linux: CVE-2023-27371: ELSA-2023-6566:libmicrohttpd security update (MODERATE) (Multiple Advisories) Severity 5 CVSS (AV:N/AC:H/Au:N/C:N/I:N/A:C) Published 02/28/2023 Created 11/24/2023 Added 11/22/2023 Modified 12/17/2024 Description GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function. An out-of-bounds flaw was found in GNU's libmicrohttpd due to improper parsing of a multipart/form-data boundary in the MHD_create_post_processor() method in postprocessor.c. This flaw allows an attacker to remotely send a malicious HTTP POST packet that includes one or more ‘\0’ bytes in a multipart/form-data boundary field, which, assuming a specific heap layout, will result in an out-of-bounds read and a crash in the find_boundary() function, causing a denial of service. Solution(s) oracle-linux-upgrade-libmicrohttpd oracle-linux-upgrade-libmicrohttpd-devel oracle-linux-upgrade-libmicrohttpd-doc References https://attackerkb.com/topics/cve-2023-27371 CVE - 2023-27371 ELSA-2023-6566 ELSA-2023-7090