Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9079a54f-f83b-486f-b66b-79ed0ba69838@pipping.org>
Date: Tue, 12 May 2026 20:13:21 +0200
From: Sebastian Pipping <sebastian@...ping.org>
To: oss-security@...ts.openwall.com
Cc: Ilia <ilia@...a.ws>, solar@...nwall.com
Subject: Re: uriparser 1.0.2 fixes CVE-2026-44927 and
 CVE-2026-44928

Ilia, thanks for jumping in!


On 5/12/26 19:44, Ilia wrote:
>      > CVE-2026-44927: In uriparser before 1.0.2, there is pointer
>     difference
>      > truncation to int in various places.
> 
>  From my perspective CVE-2026-44927 is a low-severity security issue 
> that would be hard to exploit in reality since it requires an actual 
> 2gb+ input to even trigger. For example, in the context of PHP (which 
> uses the lib) you'd hit the memory limit long before this even triggers. 
> Therefore, this is "Low" severity from my perspective. Given the input 
> size, it definitely doesn't have a remote vector.

I have no problem with this being considering "low severity" based
on the payload size needed, but this /does/ have a remote vector that is
independent of size constraints, as far as I am concerned. I just 
checked the definition of a remote attack vector a la CVSS [3][4] and
it's not "adjacent", not "local", and not "physical": I see nothing
stopping applications from parsing URI strings read "from the wire",
directly or indirectly, the same way that XMPP parses XML from the wire.
Am I missing something here?

Best



Sebastian


[3] 
https://www.first.org/cvss/v3.0/specification-document#Exploitability-Metrics
[4] 
https://www.first.org/cvss/v4.0/specification-document#Exploitability-Metrics

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.