{"id":"CVE-2023-27371","details":"GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.","modified":"2026-03-14T12:04:38.998385Z","published":"2023-02-28T20:15:10.157Z","related":["ALSA-2023:6566","ALSA-2023:7090","SUSE-SU-2023:1686-1","SUSE-SU-2023:1686-2","SUSE-SU-2023:1944-1","openSUSE-SU-2024:12739-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00029.html"},{"type":"FIX","url":"https://git.gnunet.org/libmicrohttpd.git/commit/?id=6d6846e20bfdf4b3eb1b592c97520a532f724238"},{"type":"ARTICLE","url":"https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html"},{"type":"EVIDENCE","url":"https://github.com/0xhebi/CVEs/tree/main/GNU%20Libmicrohttpd"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27371.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"0.9.76"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}