Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23837: CWE-770: Allocation of Resources Without Limits or Throttling in OISF libhtp

0
High
VulnerabilityCVE-2024-23837cvecve-2024-23837cwe-770
Published: Mon Feb 26 2024 (02/26/2024, 16:17:24 UTC)
Source: CVE Database V5
Vendor/Project: OISF
Product: libhtp

Description

LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:47:23 UTC

Technical Analysis

CVE-2024-23837 is a vulnerability classified under CWE-770, which concerns allocation of resources without limits or throttling. The affected component, libhtp, is a security-aware HTTP protocol parser widely used in network security tools developed by the Open Information Security Foundation (OISF), such as Suricata. The vulnerability arises when libhtp processes specially crafted HTTP headers that cause it to consume excessive CPU resources due to unbounded allocation or processing loops. This leads to a denial of service condition by exhausting processing capacity, effectively disrupting the availability of services relying on libhtp for HTTP parsing. The flaw does not impact confidentiality or integrity but severely affects availability. Exploitation requires no privileges or user interaction and can be triggered remotely by sending malicious HTTP traffic. The issue was addressed in libhtp version 0.5.46, which introduced limits or throttling mechanisms to prevent excessive resource consumption during header parsing. No public exploits have been reported yet, but the vulnerability’s characteristics make it a credible DoS vector against network security devices or applications using vulnerable libhtp versions.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of network security infrastructure and applications that rely on libhtp for HTTP parsing. Denial of service attacks exploiting this flaw could disrupt intrusion detection and prevention systems (e.g., Suricata), web application firewalls, or other security appliances, potentially leading to downtime or degraded security monitoring capabilities. Critical sectors such as finance, telecommunications, government, and critical infrastructure operators in Europe could face operational interruptions and increased exposure to other threats during service outages. The lack of confidentiality or integrity impact limits the risk to data breaches, but the availability impact alone can have severe business continuity consequences. Organizations with high traffic volumes or exposure to untrusted HTTP traffic are particularly vulnerable to exploitation attempts.

Mitigation Recommendations

The primary mitigation is to upgrade libhtp to version 0.5.46 or later, where the vulnerability is fixed. Organizations should audit their environments to identify all instances of libhtp usage, including embedded systems and security tools like Suricata. In addition to patching, deploying network-level rate limiting and anomaly detection to identify and block suspicious HTTP header patterns can reduce the risk of exploitation. Implementing resource usage monitoring on affected systems can help detect early signs of exploitation attempts. Security teams should also review firewall and intrusion detection rules to detect abnormal HTTP traffic patterns indicative of this attack. Regular vulnerability scanning and timely patch management processes are essential to prevent exploitation. Finally, organizations should stay informed about any emerging exploits or proof-of-concept code related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-01-22T22:23:54.340Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908f50bf612d110fe9cbe7d

Added to database: 11/3/2025, 6:31:39 PM

Last enriched: 11/3/2025, 6:47:23 PM

Last updated: 11/5/2025, 1:49:27 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats