ID |
CVE-2012-5533
|
Summary |
The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header. Per: http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt
" Affected versions
-------------------
Only 1.4.31; on the other hand versions before 1.4.31 include the "invalid read" bug." |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 5.0 (as of 29-08-2017 - 01:32) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
refmap
via4
|
bid | 56619 | confirm | | exploit-db | 22902 | hp | HPSBGN03191 | mandriva | MDVSA-2013:100 | misc | | mlist | [oss-security] 20121121 lighttpd 1.4.32 released, fixing CVE-2012-5533 | osvdb | 87623 | sectrack | 1027802 | secunia | | suse | - openSUSE-SU-2012:1532
- openSUSE-SU-2014:0074
| xf | lighttpd-httprequestsplitvalue-dos(80213) |
|
Last major update |
29-08-2017 - 01:32 |
Published |
24-11-2012 - 20:55 |
Last modified |
29-08-2017 - 01:32 |