First published: Mon Dec 09 2013(Updated: )
An out-of-bounds memory read flaw was found in the MHD_http_unescape() function in libmicrohttpd. This could possibly lead to information disclosure or allow a remote attacker to cause an application using libmicrohttpd to crash. This issue has been resolved in version 0.9.32. References: <a href="https://gnunet.org/svn/libmicrohttpd/ChangeLog">https://gnunet.org/svn/libmicrohttpd/ChangeLog</a> <a href="http://secunia.com/advisories/55903/">http://secunia.com/advisories/55903/</a> <a href="https://bugs.gentoo.org/show_bug.cgi?id=493450">https://bugs.gentoo.org/show_bug.cgi?id=493450</a> Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Affected Software | Affected Version | How to fix |
---|---|---|
Libmicrohttpd | <0.9.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1039384 is high due to potential information disclosure and application crashes.
To fix REDHAT-BUG-1039384, update libmicrohttpd to version 0.9.32 or later.
The issue in REDHAT-BUG-1039384 is caused by an out-of-bounds memory read in the MHD_http_unescape() function.
The affected software for REDHAT-BUG-1039384 is GNU libmicrohttpd prior to version 0.9.32.
Yes, REDHAT-BUG-1039384 can potentially be exploited by remote attackers causing application crashes or information disclosure.