First published: Mon Sep 12 2022(Updated: )
In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lighttpd Lighttpd | =1.4.65 | |
Debian Debian Linux | =10.0 | |
debian/lighttpd | <=1.4.53-4+deb10u2 | 1.4.53-4+deb10u3 1.4.59-1+deb11u2 1.4.69-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-37797.
CVE-2022-37797 has a severity level of 7.5 (high).
CVE-2022-37797 affects Lighttpd version 1.4.65 and possibly other versions.
CVE-2022-37797 can cause a server crash and result in a denial of service condition.
Yes, please refer to the referenced sources for patches and fixes for CVE-2022-37797.