Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-3833


Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.


Published

2019-03-14T22:29:01.290

Last Modified

2024-11-21T04:42:38.473

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-835
  • Type: Secondary
    CWE-835

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openwsman_project openwsman ≤ 2.6.9 Yes
Operating System fedoraproject fedora 28 Yes
Operating System fedoraproject fedora 29 Yes
Operating System fedoraproject fedora 30 Yes
Operating System opensuse leap 15.0 Yes
Operating System opensuse leap 42.3 Yes

References