Vulnerability identifier: #VU15467
Vulnerability risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Pivotal Spring Framework
Server applications /
Frameworks for developing and running applications
Vendor: Pivotal
Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists in Pivotal Software Spring Framework due to improper handling of range requests. A remote attacker can send a specially crafted request that contains an additional range header with a high number of ranges or with wide ranges that overlap and cause the service to crash.
Mitigation
The vulnerability has been addressed in the version 4.3.20, 5.0.10, 5.1.1.
Vulnerable software versions
Pivotal Spring Framework: 5.1.0, 4.2 - 4.2.19, 4.3.0 - 4.3.18, 5.0.0 - 5.0.9
External links
http://pivotal.io/security/cve-2018-15756
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.