Vulnerability Description
A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. It can be conducted multiple times in a loop to cause DoS.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbmc-Project | Openbmc | >= 2.10.0, <= 2.13.0 |
Related Weaknesses (CWE)
References
- https://github.com/openbmc/bmcwebProductThird Party Advisory
- https://github.com/openbmc/bmcwebProductThird Party Advisory
FAQ
What is CVE-2022-2809?
CVE-2022-2809 is a vulnerability with a CVSS score of 8.2 (HIGH). A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptio...
How severe is CVE-2022-2809?
CVE-2022-2809 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2809?
Check the references section above for vendor advisories and patch information. Affected products include: Openbmc-Project Openbmc.