First published: Sat Nov 24 2012(Updated: )
The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lighttpd Lighttpd | =1.4.31 | |
Lighttpd Lighttpd | =1.4.32 |
http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.