7.5
CWE
476
Advisory Published
Updated

CVE-2018-15505: Null Pointer Dereference

First published: Sat Aug 18 2018(Updated: )

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Mbedthis AppWeb HTTP server<7.0.2
Embedthis GoAhead Web Server<4.0.1
Junos OS Evolved=12.3
Junos OS Evolved=12.3-r1
Junos OS Evolved=12.3-r10
Junos OS Evolved=12.3-r10-s1
Junos OS Evolved=12.3-r10-s2
Junos OS Evolved=12.3-r11
Junos OS Evolved=12.3-r12
Junos OS Evolved=12.3-r12-s1
Junos OS Evolved=12.3-r12-s10
Junos OS Evolved=12.3-r12-s11
Junos OS Evolved=12.3-r12-s12
Junos OS Evolved=12.3-r12-s13
Junos OS Evolved=12.3-r12-s20
Junos OS Evolved=12.3-r12-s3
Junos OS Evolved=12.3-r12-s4
Junos OS Evolved=12.3-r12-s6
Junos OS Evolved=12.3-r12-s8
Junos OS Evolved=12.3x48
Junos OS Evolved=12.3x48-d10
Junos OS Evolved=12.3x48-d15
Junos OS Evolved=12.3x48-d20
Junos OS Evolved=12.3x48-d25
Junos OS Evolved=12.3x48-d30
Junos OS Evolved=12.3x48-d35
Junos OS Evolved=12.3x48-d40
Junos OS Evolved=12.3x48-d45
Junos OS Evolved=12.3x48-d50
Junos OS Evolved=12.3x48-d51
Junos OS Evolved=12.3x48-d55
Junos OS Evolved=12.3x48-d60
Junos OS Evolved=12.3x48-d65
Junos OS Evolved=12.3x48-d66
Junos OS Evolved=12.3x48-d70
Junos OS Evolved=12.3x48-d75
Junos OS Evolved=15.1
Junos OS Evolved=15.1-a1
Junos OS Evolved=15.1-f
Junos OS Evolved=15.1-f1
Junos OS Evolved=15.1-f2
Junos OS Evolved=15.1-f2-s1
Junos OS Evolved=15.1-f2-s2
Junos OS Evolved=15.1-f2-s3
Junos OS Evolved=15.1-f2-s4
Junos OS Evolved=15.1-f3
Junos OS Evolved=15.1-f4
Junos OS Evolved=15.1-f5
Junos OS Evolved=15.1-f5-s7
Junos OS Evolved=15.1-f6
Junos OS Evolved=15.1-f6-s1
Junos OS Evolved=15.1-f6-s10
Junos OS Evolved=15.1-f6-s12
Junos OS Evolved=15.1-f6-s2
Junos OS Evolved=15.1-f6-s3
Junos OS Evolved=15.1-f6-s4
Junos OS Evolved=15.1-f6-s5
Junos OS Evolved=15.1-f6-s6
Junos OS Evolved=15.1-f6-s7
Junos OS Evolved=15.1-f6-s8
Junos OS Evolved=15.1-f6-s9
Junos OS Evolved=15.1-r7
Junos OS Evolved=15.1-r7-s1
Junos OS Evolved=15.1-r7-s10
Junos OS Evolved=15.1-r7-s11
Junos OS Evolved=15.1-r7-s12
Junos OS Evolved=15.1-r7-s2
Junos OS Evolved=15.1-r7-s3
Junos OS Evolved=15.1x49
Junos OS Evolved=15.1x49-d10
Junos OS Evolved=15.1x49-d100
Junos OS Evolved=15.1x49-d110
Junos OS Evolved=15.1x49-d120
Junos OS Evolved=15.1x49-d130
Junos OS Evolved=15.1x49-d131
Junos OS Evolved=15.1x49-d140
Junos OS Evolved=15.1x49-d15
Junos OS Evolved=15.1x49-d150
Junos OS Evolved=15.1x49-d160
Junos OS Evolved=15.1x53
Junos OS Evolved=15.1x53
Junos OS Evolved=15.1x53-d10
Junos OS Evolved=15.1x53-d20
Junos OS Evolved=15.1x53-d21
Junos OS Evolved=15.1x53-d210
Junos OS Evolved=15.1x53-d230
Junos OS Evolved=15.1x53-d231
Junos OS Evolved=15.1x53-d232
Junos OS Evolved=15.1x53-d233
Junos OS Evolved=15.1x53-d234
Junos OS Evolved=15.1x53-d235
Junos OS Evolved=15.1x53-d236
Junos OS Evolved=15.1x53-d237
Junos OS Evolved=15.1x53-d25
Junos OS Evolved=15.1x53-d30
Junos OS Evolved=15.1x53-d31
Junos OS Evolved=15.1x53-d32
Junos OS Evolved=15.1x53-d33
Junos OS Evolved=15.1x53-d34
Junos OS Evolved=15.1x53-d40
Junos OS Evolved=15.1x53-d45
Junos OS Evolved=15.1x53-d47
Junos OS Evolved=15.1x53-d470
Junos OS Evolved=15.1x53-d471
Junos OS Evolved=15.1x53-d48
Junos OS Evolved=15.1x53-d490
Junos OS Evolved=15.1x53-d495
Junos OS Evolved=15.1x53-d50
Junos OS Evolved=15.1x53-d51
Junos OS Evolved=15.1x53-d52
Junos OS Evolved=15.1x53-d55
Junos OS Evolved=15.1x53-d56
Junos OS Evolved=15.1x53-d57
Junos OS Evolved=15.1x53-d58
Junos OS Evolved=15.1x53-d59
Junos OS Evolved=15.1x53-d60
Junos OS Evolved=15.1x53-d61
Junos OS Evolved=15.1x53-d62
Junos OS Evolved=15.1x53-d63
Junos OS Evolved=15.1x53-d64
Junos OS Evolved=15.1x53-d65
Junos OS Evolved=15.1x53-d66
Junos OS Evolved=15.1x53-d67
Junos OS Evolved=15.1x53-d68
Junos OS Evolved=15.1x53-d69
Junos OS Evolved=15.1x53-d70
Junos OS Evolved=16.1
Junos OS Evolved=16.1-r
Junos OS Evolved=16.1-r1
Junos OS Evolved=16.1-r2
Junos OS Evolved=16.1-r3
Junos OS Evolved=16.1-r3-s10
Junos OS Evolved=16.1-r3-s11
Junos OS Evolved=16.1-r3-s8
Junos OS Evolved=16.1-r4
Junos OS Evolved=16.1-r4-s12
Junos OS Evolved=16.1-r4-s2
Junos OS Evolved=16.1-r4-s3
Junos OS Evolved=16.1-r4-s4
Junos OS Evolved=16.1-r4-s6
Junos OS Evolved=16.1-r4-s8
Junos OS Evolved=16.1-r4-s9
Junos OS Evolved=16.1-r7
Junos OS Evolved=16.1-r7-s2
Junos OS Evolved=16.1-r7-s3
Junos OS Evolved=16.1-r7-s4
Junos OS Evolved=16.2
Junos OS Evolved=16.2-r1
Junos OS Evolved=16.2-r1-s6
Junos OS Evolved=16.2-r2
Junos OS Evolved=16.2-r2-s1
Junos OS Evolved=16.2-r2-s2
Junos OS Evolved=16.2-r2-s5
Junos OS Evolved=16.2-r2-s6
Junos OS Evolved=16.2-r2-s7
Junos OS Evolved=16.2-r2-s8
Junos OS Evolved=16.2-r2-s9
Junos OS Evolved=17.1
Junos OS Evolved=17.1-r1
Junos OS Evolved=17.1-r1-s7
Junos OS Evolved=17.1-r2
Junos OS Evolved=17.1-r2-s1
Junos OS Evolved=17.1-r2-s10
Junos OS Evolved=17.1-r2-s11
Junos OS Evolved=17.1-r2-s2
Junos OS Evolved=17.1-r2-s3
Junos OS Evolved=17.1-r2-s4
Junos OS Evolved=17.1-r2-s5
Junos OS Evolved=17.1-r2-s6
Junos OS Evolved=17.1-r2-s7
Junos OS Evolved=17.1-r2-s8
Junos OS Evolved=17.1-r2-s9
Junos OS Evolved=17.2
Junos OS Evolved=17.2-r1
Junos OS Evolved=17.2-r1-s1
Junos OS Evolved=17.2-r1-s2
Junos OS Evolved=17.2-r1-s3
Junos OS Evolved=17.2-r1-s4
Junos OS Evolved=17.2-r1-s5
Junos OS Evolved=17.2-r1-s6
Junos OS Evolved=17.2-r1-s7
Junos OS Evolved=17.2-r1-s8
Junos OS Evolved=17.2-r2
Junos OS Evolved=17.2-r2-s4
Junos OS Evolved=17.2-r2-s6
Junos OS Evolved=17.2-r3
Junos OS Evolved=17.3
Junos OS Evolved=17.3-r1
Junos OS Evolved=17.3-r1-s1
Junos OS Evolved=17.3-r1-s4
Junos OS Evolved=17.3-r2
Junos OS Evolved=17.3-r2-s1
Junos OS Evolved=17.3-r2-s2
Junos OS Evolved=17.3-r2-s3
Junos OS Evolved=17.3-r2-s4
Junos OS Evolved=17.3-r2-s5
Junos OS Evolved=17.3-r3
Junos OS Evolved=17.3-r3
Junos OS Evolved=17.3-r3-s1
Junos OS Evolved=17.3-r3-s2
Junos OS Evolved=17.3-r3-s3
Junos OS Evolved=17.3-r3-s4
Junos OS Evolved=17.4
Junos OS Evolved=17.4-r1
Junos OS Evolved=17.4-r1-s1
Junos OS Evolved=17.4-r1-s2
Junos OS Evolved=17.4-r1-s3
Junos OS Evolved=17.4-r1-s4
Junos OS Evolved=17.4-r1-s5
Junos OS Evolved=17.4-r1-s6
Junos OS Evolved=17.4-r2
Junos OS Evolved=17.4-r2-s1
Junos OS Evolved=17.4-r2-s2
Junos OS Evolved=17.4-r2-s3
Junos OS Evolved=18.1
Junos OS Evolved=18.1-r1
Junos OS Evolved=18.1-r2
Junos OS Evolved=18.1-r2-s1
Junos OS Evolved=18.1-r2-s2
Junos OS Evolved=18.1-r2-s4
Junos OS Evolved=18.1-r3
Junos OS Evolved=18.1-r3-s1
Junos OS Evolved=18.1-r3-s2
Junos OS Evolved=18.1-r3-s3
Junos OS Evolved=18.1-r3-s4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-15505?

    The severity of CVE-2018-15505 is considered moderate due to its potential to cause a denial of service.

  • How do I fix CVE-2018-15505?

    To fix CVE-2018-15505, you should upgrade Embedthis GoAhead to version 4.0.1 or Appweb to version 7.0.2 or later.

  • What types of systems are affected by CVE-2018-15505?

    CVE-2018-15505 affects Embedthis GoAhead versions prior to 4.0.1 and Appweb versions prior to 7.0.2, as well as specific Juniper JUNOS versions.

  • Can CVE-2018-15505 be exploited remotely?

    Yes, CVE-2018-15505 can be exploited remotely through crafted HTTP POST requests.

  • What impact can an attacker have if exploiting CVE-2018-15505?

    An attacker exploiting CVE-2018-15505 could cause a denial of service by triggering a NULL pointer dereference.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203