![]() ![]() However, it's not necessary that both vulnerabilities could be exploited in all embedded devices running the vulnerable versions of the GoAhead web server. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server," the researchers say. "A specially crafted HTTP request can lead to an infinite loop in the process (resulting in 100 percent CPU utilization). The second vulnerability, assigned as CVE-2019-5097, also resides in the same component of the GoAhead Web Server and can be exploited in the same way, but this one leads to denial-of-service attacks. ![]() According to the researchers at Cisco Talos, while processing a specially crafted HTTP request, an attacker exploiting the vulnerability can cause use-after-free condition on the server and corrupt heap structures, leading to code execution attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |