Vulnerability Description
Hydra through 0.1.8 has a NULL pointer dereference and daemon crash when processing POST requests that lack a Content-Length header. read.c, request.c, and util.c contribute to this. The process_header_end() function calls boa_atoi(), which ultimately calls atoi() on a NULL pointer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hydra Project | Hydra | <= 0.1.8 |
Related Weaknesses (CWE)
References
- http://hydra.hellug.grThird Party Advisory
- https://gist.github.com/fxb6476/0b9883a88ff2ca40de46a8469834e16cExploitThird Party Advisory
- http://hydra.hellug.grThird Party Advisory
- https://gist.github.com/fxb6476/0b9883a88ff2ca40de46a8469834e16cExploitThird Party Advisory
FAQ
What is CVE-2019-17502?
CVE-2019-17502 is a vulnerability with a CVSS score of 7.5 (HIGH). Hydra through 0.1.8 has a NULL pointer dereference and daemon crash when processing POST requests that lack a Content-Length header. read.c, request.c, and util.c contribute to this. The process_heade...
How severe is CVE-2019-17502?
CVE-2019-17502 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-17502?
Check the references section above for vendor advisories and patch information. Affected products include: Hydra Project Hydra.