7.8
CVSSv2

CVE-2017-5850

Published: 27/03/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

httpd in OpenBSD allows remote malicious users to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openbsd 6.0

Exploits

## Advisory Information Title: Remote DoS against OpenBSD http server (up to 60) Advisory URL: pierrekimgithubio/advisories/CVE-2017-5850-openbsdtxt Blog URL: pierrekimgithubio/blog/2017-02-07-openbsd-httpd-CVE-2017-5850html Date published: 2017-02-07 Vendors contacted: OpenBSD Release mode: Released CVE: CVE-2017-5850 ## ...
OpenBSD HTTP server versions up to 60 suffer from a denial of service vulnerability ...

Recent Articles

Got an OpenBSD Web server? Better patch it
The Register • Richard Chirgwin • 07 Feb 2017

DoS-able bugs splatted

OpenBSD and two of its SSL libraries need patches against a pair of denial-of-service bugs that can crash Web-facing servers. The first is in the operating system's SSL implementation, specifically in the HTTP daemon. An advisory says that daemon can be crashed with repeated SSL renegotiation. A single renegotiation thread, the post claims, can soak up 70 per cent of CPU cycles, meaning if the attacker fires multiple renegotiation threads at the target, the daemon will crash, and “there is no ...