CVE-2017-2891

Publication date 7 November 2017

Last updated 25 August 2025


Ubuntu priority

Cvss 3 Severity Score

9.8 · Critical

Score breakdown

Description

An exploitable use-after-free vulnerability exists in the HTTP server implementation of Cesanta Mongoose 6.8. An ordinary HTTP POST request with a CGI target can cause a reuse of previously freed pointer potentially resulting in remote code execution. An attacker needs to send this HTTP request over the network to trigger this vulnerability.

Read the notes from the security team

Status

Package Ubuntu Release Status
smplayer 17.10 artful
Not affected
17.04 zesty
Not affected
16.04 LTS xenial
Not affected
14.04 LTS trusty Not in release

Notes


sbeattie

mongoose is used on windows only to serve up content for chromecast

Severity score breakdown

Parameter Value
Base score 9.8 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H