Source: uap-core
Version: 20181019-1
Severity: important
Tags: security upstream

Hi,

The following vulnerability was published for uap-core.

CVE-2018-20164[0]:
| An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser
| UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS)
| issue allows remote attackers to overload a server by setting the
| User-Agent header in an HTTP(S) request to a value containing a long
| digit string. (The UAP-Core project contains the vulnerability,
| propagating to all implementations.)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-20164
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20164
[1] https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/

Regards,
Salvatore

Reply via email to