Oisf

Libhtp

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 23.07.2025 20:35:30
  • Zuletzt bearbeitet 05.08.2025 15:48:54

LibHTP is a security-aware parser for the HTTP protocol and its related bits and pieces. In versions 0.5.50 and below, there is a traffic-induced memory leak that can starve the process of memory, leading to loss of visibility. To workaround this iss...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 16.10.2024 19:15:27
  • Zuletzt bearbeitet 09.07.2025 17:02:19

LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Prior to version 0.5.49, unbounded processing of HTTP request and response headers can lead to excessive CPU time and memory utilization, possibly leading to ext...

  • EPSS 0.49%
  • Veröffentlicht 04.04.2024 15:15:38
  • Zuletzt bearbeitet 30.06.2025 14:54:40

LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are avail...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 26.02.2024 16:27:57
  • Zuletzt bearbeitet 07.02.2025 17:35:33

LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.

  • EPSS 0.24%
  • Veröffentlicht 10.10.2019 01:06:09
  • Zuletzt bearbeitet 21.11.2024 04:32:17

In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.

  • EPSS 0.82%
  • Veröffentlicht 04.04.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:05

htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.

  • EPSS 0.83%
  • Veröffentlicht 28.08.2017 15:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference).