First published: Mon Sep 10 2007(Updated: )
Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/1.4.18 | <1. | 1. |
Fipsasp Fipscms Light | <=1.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4727 is considered a critical vulnerability as it allows remote attackers to execute arbitrary code.
To fix CVE-2007-4727, you should upgrade to lighttpd version 1.4.18 or later.
CVE-2007-4727 affects lighttpd versions prior to 1.4.18, particularly systems using the mod_fastcgi extension.
Yes, CVE-2007-4727 can be exploited remotely via specially crafted HTTP requests.
CVE-2007-4727 can lead to arbitrary code execution, potentially compromising server integrity and security.