Korean
<< Back
VID 22453
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The lighttpd Web Server is vulnerable to a buffer overflow vulnerability in the mod_fastcgi extension. lighttpd is a web server that provides an interface to external programs and allows Web applications to run separate chroot. The lighttpd version 1.4.17 and earlier versions could allow a remote attacker to execute arbitrary code on the system, caused due to a buffer overflow error in the mod_fastcgi extension when handling headers in a HTTP request. By sending a specially-crafted request with an overly large contentLength value, a remote attacker could exploit this vulnerability to execute arbitrary code on the affected host.

* References:
http://www.lighttpd.net/assets/2007/9/9/lighttpd_sa_2007_12.txt
http://trac.lighttpd.net/trac/changeset/1986
http://secweb.se/en/advisories/lighttpd-fastcgi-remote-vulnerability/
http://www.securityfocus.com/archive/1/archive/1/479763/100/0/threaded
http://securityreason.com/securityalert/3127
http://www.frsirt.com/english/advisories/2007/3110
http://secunia.com/advisories/26732

* Platforms Affected:
lighttpd version 1.4.17 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of lighttpd (1.4.18 or later), available from the lighttpd Download Web site at http://lighttpd.net/download/
Related URL CVE-2007-4727 (CVE)
Related URL 25622 (SecurityFocus)
Related URL 36526 (ISS)