{"id":"UBUNTU-CVE-2019-3833","details":"Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.","modified":"2026-01-20T17:11:28.405684Z","published":"2019-03-14T22:29:00Z","upstream":["CVE-2019-3833"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-3833"},{"type":"REPORT","url":"http://bugzilla.suse.com/show_bug.cgi?id=1122623"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3833"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-3833"}],"affected":[{"package":{"name":"openwsman","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.4.7-0ubuntu2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.7-0ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenwsman-dev","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"libopenwsman1","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"libwsman-client2","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"libwsman-clientpp-dev","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"libwsman-clientpp1","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"libwsman-curl-client-transport1","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"libwsman-server1","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"libwsman1","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"openwsman","binary_version":"2.4.7-0ubuntu2"},{"binary_name":"python-openwsman","binary_version":"2.4.7-0ubuntu2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3833.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.7-0ubuntu2","2.6.5-0ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenwsman-dev","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"libopenwsman1","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"libwsman-client4","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"libwsman-clientpp-dev","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"libwsman-clientpp1","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"libwsman-curl-client-transport1","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"libwsman-server1","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"libwsman1","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"openwsman","binary_version":"2.6.5-0ubuntu3"},{"binary_name":"python-openwsman","binary_version":"2.6.5-0ubuntu3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3833.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu3","2.6.5-0ubuntu5"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenwsman-dev","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"libopenwsman1","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"libwsman-client4","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"libwsman-clientpp-dev","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"libwsman-clientpp1","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"libwsman-curl-client-transport1","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"libwsman-server1","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"libwsman1","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"openwsman","binary_version":"2.6.5-0ubuntu5"},{"binary_name":"python-openwsman","binary_version":"2.6.5-0ubuntu5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3833.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu5","2.6.5-0ubuntu6"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenwsman-dev","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"libopenwsman1","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"libwsman-client4","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"libwsman-clientpp-dev","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"libwsman-clientpp1","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"libwsman-curl-client-transport1","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"libwsman-server1","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"libwsman1","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"openwsman","binary_version":"2.6.5-0ubuntu6"},{"binary_name":"python-openwsman","binary_version":"2.6.5-0ubuntu6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3833.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu15?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu8","2.6.5-0ubuntu10","2.6.5-0ubuntu11","2.6.5-0ubuntu12","2.6.5-0ubuntu15"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenwsman-dev","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"libopenwsman1","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"libwsman-client4t64","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"libwsman-clientpp-dev","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"libwsman-clientpp1t64","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"libwsman-curl-client-transport1","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"libwsman-server1t64","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"libwsman1t64","binary_version":"2.6.5-0ubuntu15"},{"binary_name":"openwsman","binary_version":"2.6.5-0ubuntu15"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3833.json"}},{"package":{"name":"openwsman","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/openwsman@2.6.5-0ubuntu16?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.6.5-0ubuntu15","2.6.5-0ubuntu16"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenwsman-dev","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"libopenwsman1","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"libwsman-client4t64","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"libwsman-clientpp-dev","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"libwsman-clientpp1t64","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"libwsman-curl-client-transport1","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"libwsman-server1t64","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"libwsman1t64","binary_version":"2.6.5-0ubuntu16"},{"binary_name":"openwsman","binary_version":"2.6.5-0ubuntu16"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3833.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}