CVE-2022-2809

A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. It can be conducted multiple times in a loop to cause DoS.
References
Link Resource
https://github.com/openbmc/bmcweb Product Third Party Advisory
https://github.com/openbmc/bmcweb Product Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbmc-project:openbmc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:01

Type Values Removed Values Added
References () https://github.com/openbmc/bmcweb - Product, Third Party Advisory () https://github.com/openbmc/bmcweb - Product, Third Party Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.2

Information

Published : 2022-10-27 13:15

Updated : 2024-11-21 07:01


NVD link : CVE-2022-2809

Mitre link : CVE-2022-2809

CVE.ORG link : CVE-2022-2809


JSON object : View

Products Affected

openbmc-project

  • openbmc
CWE
CWE-122

Heap-based Buffer Overflow

CWE-229

Improper Handling of Values

CWE-787

Out-of-bounds Write