First published: Tue Jul 02 2024(Updated: )
Go net/http package is vulnerable to a denial of service, caused by improper 100-continue header handling. By sending "Expect: 100-continue" requests, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24791 has a severity rating that indicates it can lead to denial of service.
To fix CVE-2024-24791, upgrade to golang-1.22 version 1.22.11-1 or newer.
CVE-2024-24791 affects IBM Concert Software versions 1.0.0 to 1.0.1 and golang versions 1.15.15-1~deb11u4 and 1.19.8-2.
The vulnerability in CVE-2024-24791 is caused by improper handling of the 100-continue HTTP header.
Yes, CVE-2024-24791 can be exploited remotely by sending specially crafted "Expect: 100-continue" requests.