First published: Sat Jun 11 2022(Updated: )
Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lighttpd Lighttpd | =1.4.56 | |
Lighttpd Lighttpd | =1.4.57 | |
Lighttpd Lighttpd | =1.4.58 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30780 is a vulnerability in Lighttpd versions 1.4.56 through 1.4.58 that allows a remote attacker to cause a denial of service by consuming excessive CPU resources through stuck connections.
CVE-2022-30780 affects Lighttpd by disrupting the use of multiple read operations on large headers, leading to excessive CPU consumption and a denial of service.
CVE-2022-30780 has a severity rating of 7.5, classified as high.
Lighttpd versions 1.4.56, 1.4.57, and 1.4.58 are affected by CVE-2022-30780.
At the time of writing, there are no official patches or fixes available for CVE-2022-30780. It is recommended to update to a non-vulnerable version when one becomes available.