First published: Mon Dec 03 2018(Updated: )
The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 does not correctly handle requests for byte sequences, allowing an attacker to amplify the response size by requesting the entire response body repeatedly, as demonstrated by an HTTP Range header value beginning with the "bytes=0-,0-" substring.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Litespeedtech Openlitespeed | <1.5.0 | |
Litespeedtech Openlitespeed | =1.5.0 | |
Litespeedtech Openlitespeed | =1.5.0-rc1 | |
Litespeedtech Openlitespeed | =1.5.0-rc2 | |
Litespeedtech Openlitespeed | =1.5.0-rc3 | |
Litespeedtech Openlitespeed | =1.5.0-rc4 | |
Litespeedtech Openlitespeed | =1.5.0-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19791 is a vulnerability in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 that allows attackers to amplify response size by requesting the entire response body repeatedly.
The severity of CVE-2018-19791 is rated as medium with a CVSS score of 6.5.
LiteSpeed OpenLiteSpeed versions up to 1.5.0, including 1.5.0-rc1, 1.5.0-rc2, 1.5.0-rc3, 1.5.0-rc4, and 1.5.0-rc5 are affected by CVE-2018-19791.
To mitigate CVE-2018-19791, users should update LiteSpeed OpenLiteSpeed to version 1.5.0 RC6 or later.