First published: Tue Nov 07 2017(Updated: )
An exploitable use-after-free vulnerability exists in the HTTP server implementation of Cesanta Mongoose 6.8. An ordinary HTTP POST request with a CGI target can cause a reuse of previously freed pointer potentially resulting in remote code execution. An attacker needs to send this HTTP request over the network to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cesanta Mongoose | =6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-2891 is critical with a CVSS score of 9.8.
The affected software for CVE-2017-2891 is Cesanta Mongoose 6.8.
CVE-2017-2891 is a use-after-free vulnerability.
An attacker can exploit CVE-2017-2891 by sending an HTTP POST request with a CGI target, which can cause a reuse of a previously freed pointer potentially leading to remote code execution.
To fix CVE-2017-2891, it is recommended to update to a version of Cesanta Mongoose without the vulnerability or apply any available patches provided by the vendor.