First published: Mon Mar 16 2020(Updated: )
uhttpd in OpenWrt through 18.06.5 and 19.x through 19.07.0-rc2 has an integer signedness error. This leads to out-of-bounds access to a heap buffer and a subsequent crash. It can be triggered with an HTTP POST request to a CGI script, specifying both "Transfer-Encoding: chunked" and a large negative Content-Length value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenWrt OpenWrt | >=18.06.0<=18.06.5 | |
OpenWrt OpenWrt | =19.07.0 | |
OpenWrt OpenWrt | =19.07.0-rc1 | |
OpenWrt OpenWrt | =19.07.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19945 is a vulnerability in uhttpd in OpenWrt through 18.06.5 and 19.x through 19.07.0-rc2 that leads to out-of-bounds access to a heap buffer and a subsequent crash.
CVE-2019-19945 occurs due to an integer signedness error in uhttpd, which can be triggered with an HTTP POST request to a CGI script, specifying both "Transfer-Encoding: chunked" and a large negative value.
OpenWrt versions 18.06.0 through 18.06.5 and 19.07.0-rc1 through 19.07.0-rc2 are affected by CVE-2019-19945.
CVE-2019-19945 has a severity rating of 7.5 (High).
To fix CVE-2019-19945, it is recommended to upgrade to a patched version of OpenWrt.