FKIE_CVE-2026-2436
Vulnerability from fkie_nvd - Published: 2026-03-26 20:16 - Updated: 2026-03-30 13:26
Severity ?
Summary
A flaw was found in libsoup's SoupServer. A remote attacker could exploit a use-after-free vulnerability where the `soup_server_disconnect()` function frees connection objects prematurely, even if a TLS handshake is still pending. If the handshake completes after the connection object has been freed, a dangling pointer is accessed, leading to a server crash and a Denial of Service.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libsoup\u0027s SoupServer. A remote attacker could exploit a use-after-free vulnerability where the `soup_server_disconnect()` function frees connection objects prematurely, even if a TLS handshake is still pending. If the handshake completes after the connection object has been freed, a dangling pointer is accessed, leading to a server crash and a Denial of Service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un defecto en el SoupServer de libsoup. Un atacante remoto podr\u00eda explotar una vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n donde la funci\u00f3n \u0027soup_server_disconnect()\u0027 libera objetos de conexi\u00f3n prematuramente, incluso si un handshake TLS todav\u00eda est\u00e1 pendiente. Si el handshake se completa despu\u00e9s de que el objeto de conexi\u00f3n ha sido liberado, se accede a un puntero colgante, lo que lleva a un fallo del servidor y a una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2026-2436",
"lastModified": "2026-03-30T13:26:50.827",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 4.2,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2026-03-26T20:16:11.720",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2026-2436"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442909"
},
{
"source": "secalert@redhat.com",
"url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/501"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-825"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…