First published: Mon Feb 26 2024(Updated: )
LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
LibHTP | <0.5.46 | |
LibHTP | <0.5.46 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23837 has a severity rating that indicates it can lead to denial of service due to excessive processing time.
To fix CVE-2024-23837, upgrade LibHTP to version 0.5.46 or later.
CVE-2024-23837 is caused by crafted traffic that can lead to excessive processing time of HTTP headers in LibHTP.
Versions of LibHTP prior to 0.5.46 are affected by CVE-2024-23837.
CVE-2024-23837 is associated with a denial of service attack that exploits the HTTP header processing.