Description
The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1123-1 | golang security update |
EUVD |
EUVD-2017-1402 | The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T22:19:55.128Z
Reserved: 2017-10-03T00:00:00.000Z
Link: CVE-2017-1000098
No data.
Status : Modified
Published: 2017-10-05T01:29:03.977
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-1000098
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD