First published: Fri Oct 07 2022(Updated: )
A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. It can be conducted multiple times in a loop to cause DoS.
Credit: openbmc-security@lists.ozlabs.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbmc-project Openbmc | >=2.10.0<=2.13.0 |
https://gerrit.openbmc.org/c/openbmc/bmcweb/+/56796
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2809 is a vulnerability in the bmcweb component of OpenBMC Project that allows an attacker to cause a denial of service.
CVE-2022-2809 affects OpenBMC Project version 2.10.0 to 2.13.0, allowing a user to cause a denial of service.
The severity of CVE-2022-2809 is high with a CVSS score of 7.5.
To fix CVE-2022-2809, it is recommended to update the OpenBMC Project to a version higher than 2.13.0.
More information about CVE-2022-2809 can be found at the OpenBMC Project GitHub repository: https://github.com/openbmc/bmcweb.