Oisf Libhtp vulnerabilities
7 known vulnerabilities affecting oisf/libhtp.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH5MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2025-53537HIGHCVSS 7.5fixed in 0.5.512025-07-23
CVE-2025-53537 [HIGH] CWE-401 CVE-2025-53537: LibHTP is a security-aware parser for the HTTP protocol and its related bits and pieces. In versions
LibHTP is a security-aware parser for the HTTP protocol and its related bits and pieces. In versions 0.5.50 and below, there is a traffic-induced memory leak that can starve the process of memory, leading to loss of visibility. To workaround this issue, set `suricata.yaml app-layer.protocols.http.libhtp.default-config.lzma-enabled` to false. This issu
cvelistv5nvdosv
CVE-2024-45797HIGHCVSS 7.5fixed in 0.5.492024-10-16
CVE-2024-45797 [HIGH] CWE-770 CVE-2024-45797: LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Prior to ve
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Prior to version 0.5.49, unbounded processing of HTTP request and response headers can lead to excessive CPU time and memory utilization, possibly leading to extreme slowdowns. This issue is addressed in 0.5.49.
cvelistv5nvdosv
CVE-2024-28871HIGHCVSS 7.5v0.5.46v= 0.5.462024-04-04
CVE-2024-28871 [HIGH] CWE-770 CVE-2024-28871: LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are available.
cvelistv5nvdosv
CVE-2024-23837HIGHCVSS 7.5fixed in 0.5.462024-02-26
CVE-2024-23837 [HIGH] CWE-770 CVE-2024-23837: LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive process
LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.
cvelistv5nvdosv
CVE-2019-17420MEDIUMCVSS 5.3fixed in 0.5.312019-10-10
CVE-2019-17420 [MEDIUM] CWE-459 CVE-2019-17420: In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing
In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.
nvdosv
CVE-2018-10243CRITICALCVSS 9.8v0.5.262019-04-04
CVE-2018-10243 [CRITICAL] CWE-125 CVE-2018-10243: htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a
htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.
nvdosv
CVE-2015-0928HIGHCVSS 7.5v0.5.152017-08-28
CVE-2015-0928 [HIGH] CWE-476 CVE-2015-0928: libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference).
libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference).
nvd