cpe:/a:pps.jussieu:polipo:0.9.8 cpe:/a:pps.jussieu:polipo:0.9.12 cpe:/a:pps.jussieu:polipo:1.0.4 CVE-2009-4413 2009-12-24T11:30:00.390-05:00 2010-02-26T02:10:06.767-05:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2009-12-25T12:33:00.000-05:00 EXPLOIT-DB 10338 BID 37463 SECUNIA 37607 SECUNIA 38647 DEBIAN DSA-2002 MLIST [oss-security] 20091212 CVE request: polipo DoS via overly large "Content-Length" header CONFIRM http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560779 The httpClientDiscardBody function in client.c in Polipo 0.9.8, 0.9.12, 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a large Content-Length value, which triggers an integer overflow, a signed-to-unsigned conversion error with a negative value, and a segmentation fault.