First published: Sat Nov 24 2012(Updated: )
The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fipsasp Fipscms Light | =1.4.31 | |
Fipsasp Fipscms Light | =1.4.32 |
http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5533 is classified as a denial of service vulnerability.
To fix CVE-2012-5533, upgrade to lighttpd version 1.4.32 or later.
CVE-2012-5533 allows remote attackers to cause an infinite loop through malformed HTTP headers.
Yes, CVE-2012-5533 is present in lighttpd version 1.4.31.
The impact of CVE-2012-5533 on web servers is that it can lead to denial of service, rendering the server unresponsive.