CVE-2012-5533

The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
References
Link Resource
http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch Patch
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2012-11/msg00044.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00051.html
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://osvdb.org/87623
http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html
http://secunia.com/advisories/51268 Vendor Advisory
http://secunia.com/advisories/51298 Vendor Advisory
http://www.exploit-db.com/exploits/22902 Exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2013:100
http://www.openwall.com/lists/oss-security/2012/11/21/1
http://www.securityfocus.com/bid/56619 Exploit
http://www.securitytracker.com/id?1027802
https://exchange.xforce.ibmcloud.com/vulnerabilities/80213
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0345
http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch Patch
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2012-11/msg00044.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00051.html
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://osvdb.org/87623
http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html
http://secunia.com/advisories/51268 Vendor Advisory
http://secunia.com/advisories/51298 Vendor Advisory
http://www.exploit-db.com/exploits/22902 Exploit
http://www.mandriva.com/security/advisories?name=MDVSA-2013:100
http://www.openwall.com/lists/oss-security/2012/11/21/1
http://www.securityfocus.com/bid/56619 Exploit
http://www.securitytracker.com/id?1027802
https://exchange.xforce.ibmcloud.com/vulnerabilities/80213
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0345
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:lighttpd:lighttpd:1.4.31:*:*:*:*:*:*:*
cpe:2.3:a:lighttpd:lighttpd:1.4.32:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch - Patch () http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch - Patch
References () http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt - Vendor Advisory () http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt - Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2012-11/msg00044.html - () http://lists.opensuse.org/opensuse-updates/2012-11/msg00044.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00051.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00051.html -
References () http://marc.info/?l=bugtraq&m=141576815022399&w=2 - () http://marc.info/?l=bugtraq&m=141576815022399&w=2 -
References () http://osvdb.org/87623 - () http://osvdb.org/87623 -
References () http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html - () http://packetstormsecurity.org/files/118282/Simple-Lighttpd-1.4.31-Denial-Of-Service.html -
References () http://secunia.com/advisories/51268 - Vendor Advisory () http://secunia.com/advisories/51268 - Vendor Advisory
References () http://secunia.com/advisories/51298 - Vendor Advisory () http://secunia.com/advisories/51298 - Vendor Advisory
References () http://www.exploit-db.com/exploits/22902 - Exploit () http://www.exploit-db.com/exploits/22902 - Exploit
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:100 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:100 -
References () http://www.openwall.com/lists/oss-security/2012/11/21/1 - () http://www.openwall.com/lists/oss-security/2012/11/21/1 -
References () http://www.securityfocus.com/bid/56619 - Exploit () http://www.securityfocus.com/bid/56619 - Exploit
References () http://www.securitytracker.com/id?1027802 - () http://www.securitytracker.com/id?1027802 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/80213 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80213 -
References () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0345 - () https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0345 -

Information

Published : 2012-11-24 20:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5533

Mitre link : CVE-2012-5533

CVE.ORG link : CVE-2012-5533


JSON object : View

Products Affected

lighttpd

  • lighttpd
CWE
CWE-399

Resource Management Errors