CVE-2018-20164

NameCVE-2018-20164
DescriptionAn issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains the vulnerability, propagating to all implementations.)
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs922717

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
uap-core (PTS)buster20190213-2fixed
bullseye1:0.12.0-1fixed
bookworm1:0.16.0-1fixed
sid, trixie1:0.18.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
uap-coresource(unstable)20190213-1922717

Notes

https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014
https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc
https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/

Search for package or bug name: Reporting problems