CVE-2024-28871

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28871
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28871.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28871
Aliases
  • GHSA-ffr2-45w9-7wmg
Downstream
Related
Published
2024-04-04T14:46:02Z
Modified
2025-10-22T18:41:55.448373Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Excessive CPU used on malformed traffic
Details

LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are available.

Database specific
{
    "cwe_ids": [
        "CWE-770"
    ]
}
References

Affected packages

Git / github.com/oisf/libhtp

Affected ranges

Type
GIT
Repo
https://github.com/oisf/libhtp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.2.5
0.5.0
0.5.1
0.5.10
0.5.11
0.5.12
0.5.13
0.5.14
0.5.15
0.5.16
0.5.17
0.5.18
0.5.19
0.5.2
0.5.20
0.5.21
0.5.22
0.5.23
0.5.24
0.5.25
0.5.26
0.5.27
0.5.28
0.5.29
0.5.3
0.5.30
0.5.31
0.5.32
0.5.33
0.5.34
0.5.35
0.5.36
0.5.37
0.5.38
0.5.39
0.5.4
0.5.40
0.5.41
0.5.42
0.5.43
0.5.44
0.5.45
0.5.5
0.5.6
0.5.7
0.5.8
0.5.9

Database specific

vanir_signatures

[
    {
        "source": "https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d",
        "id": "CVE-2024-28871-3ed3ea6c",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "test/test_main.cpp"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "318172770935594959350941458745435307763",
                "135239512933602376594045183615727728699",
                "131700058990156315402314416600437322377",
                "277994319879901349994914593103939313737"
            ]
        },
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d",
        "id": "CVE-2024-28871-42916d96",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "TEST_F",
            "file": "test/test_main.cpp"
        },
        "digest": {
            "length": 354.0,
            "function_hash": "148640750141087490866965115654957542471"
        },
        "signature_type": "Function"
    },
    {
        "source": "https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d",
        "id": "CVE-2024-28871-5f9a7a33",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "htp/htp_request.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "267359046665290570769923342758498273095",
                "303551294191400035276263804370023306921",
                "119839181945903624091477649627408790864",
                "161212438092718958504047245052704100794",
                "150200054387931348240854522730784242602",
                "207265992600273278446008837170369875565",
                "94233397943067680948929258014963379952",
                "177308729534991442599318098923060054484",
                "147060639569616060088023905671536173844",
                "74451318637906718655269567190115454574",
                "9565752617086491266711890594113080014",
                "257183742756321029938664592568116238449",
                "163640541665630402471706784285028629",
                "327832901355841139650099125053069665217",
                "298221389295221802504942701590661372085"
            ]
        },
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d",
        "id": "CVE-2024-28871-7dd59a4d",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "function": "htp_connp_REQ_PROTOCOL",
            "file": "htp/htp_request.c"
        },
        "digest": {
            "length": 831.0,
            "function_hash": "42034569953756389800674741515598562518"
        },
        "signature_type": "Function"
    }
]