Gnome

Libsoup

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.87%
  • Veröffentlicht 03.04.2025 03:15:18
  • Zuletzt bearbeitet 20.06.2025 15:26:29

A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP serv...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 11.11.2024 20:15:20
  • Zuletzt bearbeitet 04.09.2025 16:04:03

GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 11.11.2024 20:15:20
  • Zuletzt bearbeitet 04.09.2025 18:28:42

GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an applicati...

  • EPSS 0.2%
  • Veröffentlicht 11.11.2024 20:15:20
  • Zuletzt bearbeitet 05.09.2025 14:01:27

GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.

  • EPSS 0.94%
  • Veröffentlicht 06.10.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:59

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

  • EPSS 5.21%
  • Veröffentlicht 05.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:46:05

The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.

  • EPSS 0.41%
  • Veröffentlicht 04.06.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:52

WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections...

Exploit
  • EPSS 13.79%
  • Veröffentlicht 24.04.2018 19:29:02
  • Zuletzt bearbeitet 21.11.2024 03:24:23

An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable s...

  • EPSS 0.26%
  • Veröffentlicht 20.08.2012 18:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

libsoup 2.32.2 and earlier does not validate certificates or clear the trust flag when the ssl-ca-file does not exist, which allows remote attackers to bypass authentication by connecting with a SSL connection.

  • EPSS 0.6%
  • Veröffentlicht 31.08.2011 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.