ID CVE-2012-5533
Summary The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header. Per: http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt " Affected versions ------------------- Only 1.4.31; on the other hand versions before 1.4.31 include the "invalid read" bug."
References
Vulnerable Configurations
  • cpe:2.3:a:lighttpd:lighttpd:1.4.31:*:*:*:*:*:*:*
    cpe:2.3:a:lighttpd:lighttpd:1.4.31:*:*:*:*:*:*:*
  • cpe:2.3:a:lighttpd:lighttpd:1.4.32:*:*:*:*:*:*:*
    cpe:2.3:a:lighttpd:lighttpd:1.4.32:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-08-2017 - 01:32)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 56619
confirm
exploit-db 22902
hp HPSBGN03191
mandriva MDVSA-2013:100
misc
mlist [oss-security] 20121121 lighttpd 1.4.32 released, fixing CVE-2012-5533
osvdb 87623
sectrack 1027802
secunia
  • 51268
  • 51298
suse
  • openSUSE-SU-2012:1532
  • openSUSE-SU-2014:0074
xf lighttpd-httprequestsplitvalue-dos(80213)
Last major update 29-08-2017 - 01:32
Published 24-11-2012 - 20:55
Last modified 29-08-2017 - 01:32
Back to Top