First published: Sat Oct 12 2019(Updated: )
Hydra through 0.1.8 has a NULL pointer dereference and daemon crash when processing POST requests that lack a Content-Length header. read.c, request.c, and util.c contribute to this. The process_header_end() function calls boa_atoi(), which ultimately calls atoi() on a NULL pointer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ORY Hydra | <=0.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17502 is classified as a critical vulnerability due to its potential to cause a denial of service through a NULL pointer dereference.
To mitigate CVE-2019-17502, you should upgrade your version of Hydra to at least 0.1.9 or later.
CVE-2019-17502 affects Hydra versions up to and including 0.1.8.
CVE-2019-17502 is triggered when processing POST requests that do not include a Content-Length header.
The impact of CVE-2019-17502 is that it can lead to daemon crashes, disrupting service availability.