{"id":"CVE-2024-28871","summary":"Excessive CPU used on malformed traffic","details":"LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are available.","aliases":["GHSA-ffr2-45w9-7wmg"],"modified":"2026-05-19T00:38:53.022197Z","published":"2024-04-04T14:46:02.803Z","related":["openSUSE-SU-2024:14016-1"],"database_specific":{"cwe_ids":["CWE-770"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28871.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://redmine.openinfosecfoundation.org/issues/6757"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28871.json"},{"type":"ADVISORY","url":"https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-28871"},{"type":"FIX","url":"https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed"},{"type":"FIX","url":"https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/oisf/libhtp","events":[{"introduced":"0"},{"fixed":"bf618ec7f243cebfb0f7e84c3cb158955cb32b4d"}]}],"versions":["0.5.45","0.5.44","0.5.43","0.5.42","0.5.41","0.5.40","0.5.39","0.5.38","0.5.37","0.5.36","0.5.35","0.5.34","0.5.33","0.5.32","0.5.31","0.5.30","0.5.29","0.5.28","0.5.27","0.5.26","0.5.25","0.5.24","0.5.23","0.5.22","0.5.21","0.5.20","0.5.19","0.5.18","0.5.17","0.5.16","0.5.15","0.5.14","0.5.13","0.5.12","0.5.11","0.5.10","0.5.9","0.5.8","0.5.7","0.5.6","0.5.5","0.5.4","0.5.3","0.5.2","0.5.1","0.5.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-28871.json","vanir_signatures_modified":"2026-05-19T00:38:53Z","vanir_signatures":[{"signature_type":"Line","signature_version":"v1","id":"CVE-2024-28871-3ed3ea6c","target":{"file":"test/test_main.cpp"},"deprecated":false,"source":"https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d","digest":{"threshold":0.9,"line_hashes":["318172770935594959350941458745435307763","135239512933602376594045183615727728699","131700058990156315402314416600437322377","277994319879901349994914593103939313737"]}},{"signature_type":"Function","signature_version":"v1","id":"CVE-2024-28871-42916d96","target":{"function":"TEST_F","file":"test/test_main.cpp"},"deprecated":false,"source":"https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d","digest":{"length":354,"function_hash":"148640750141087490866965115654957542471"}},{"signature_type":"Line","signature_version":"v1","id":"CVE-2024-28871-5f9a7a33","target":{"file":"htp/htp_request.c"},"deprecated":false,"source":"https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d","digest":{"threshold":0.9,"line_hashes":["267359046665290570769923342758498273095","303551294191400035276263804370023306921","119839181945903624091477649627408790864","161212438092718958504047245052704100794","150200054387931348240854522730784242602","207265992600273278446008837170369875565","94233397943067680948929258014963379952","177308729534991442599318098923060054484","147060639569616060088023905671536173844","74451318637906718655269567190115454574","9565752617086491266711890594113080014","257183742756321029938664592568116238449","163640541665630402471706784285028629","327832901355841139650099125053069665217","298221389295221802504942701590661372085"]}},{"signature_type":"Function","signature_version":"v1","id":"CVE-2024-28871-7dd59a4d","target":{"function":"htp_connp_REQ_PROTOCOL","file":"htp/htp_request.c"},"deprecated":false,"source":"https://github.com/oisf/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d","digest":{"length":831,"function_hash":"42034569953756389800674741515598562518"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}