CVE-2006-5876
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/01/2007
Last modified:
09/04/2025
Description
The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:libsoup:libsoup:2.2.98:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://fedoranews.org/cms/node/2509
- http://ftp.gnome.org/pub/gnome/sources/libsoup/2.2/libsoup-2.2.99.news
- http://osvdb.org/31667
- http://secunia.com/advisories/23734
- http://secunia.com/advisories/23770
- http://secunia.com/advisories/23871
- http://secunia.com/advisories/23873
- http://secunia.com/advisories/23961
- http://secunia.com/advisories/23976
- http://www.debian.org/security/2007/dsa-1248
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A029
- http://www.securityfocus.com/bid/22034
- http://www.ubuntu.com/usn/usn-411-1
- http://www.vupen.com/english/advisories/2007/0173
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31519
- https://issues.rpath.com/browse/RPL-965
- http://fedoranews.org/cms/node/2509
- http://ftp.gnome.org/pub/gnome/sources/libsoup/2.2/libsoup-2.2.99.news
- http://osvdb.org/31667
- http://secunia.com/advisories/23734
- http://secunia.com/advisories/23770
- http://secunia.com/advisories/23871
- http://secunia.com/advisories/23873
- http://secunia.com/advisories/23961
- http://secunia.com/advisories/23976
- http://www.debian.org/security/2007/dsa-1248
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A029
- http://www.securityfocus.com/bid/22034
- http://www.ubuntu.com/usn/usn-411-1
- http://www.vupen.com/english/advisories/2007/0173
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31519
- https://issues.rpath.com/browse/RPL-965