Bug 878213 (CVE-2012-5533)

Summary: CVE-2012-5533 lighttpd: Denial of Service via malformed Connection headers
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: gwync, jlieskov, mail, rhbugs, security-response-team, wilmer
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: lighttpd 1.4.32 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-03-02 13:49:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 878914, 878915    
Bug Blocks: 878215    
Attachments:
Description Flags
upstream patch to correct the flaw
none
CVE-2012-5533 lighttpd apply patch none

Description Vincent Danen 2012-11-19 21:05:02 UTC
A flaw was found in lighttpd version 1.4.31 that could be exploited by a remote user to cause a denial of service condition in lighttpd.  A client could send a malformed Connection header to lighttpd (such as "Connection: TE,,Keep-Alive"), which would cause lighttpd to enter an endless loop, detecting an empty token but not incrementing the current string position, causing it to continually read ',' over and over.

This flaw was introduced in 1.4.31 [1] when an "invalid read" bug was fixed [2].

[1] http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2830/diff/
[2] http://redmine.lighttpd.net/issues/2413


Acknowledgement:

Red Hat would like to thank Stefan Bühler for reporting this issue. Upstream acknowledges Jesse Sipprell from McClatchy Interactive, Inc. as the original reporter.

Comment 1 Vincent Danen 2012-11-19 21:07:00 UTC
Created attachment 648125 [details]
upstream patch to correct the flaw

Comment 2 Vincent Danen 2012-11-20 16:44:26 UTC
Note that because lighttpd does not use threads, this would cause the daemon to fully be unresponsive to requests and peg the CPU core it is using to full or near-full utilization.

Comment 4 Jan Lieskovsky 2012-11-21 14:24:00 UTC
Created lighttpd tracking bugs for this issue

Affects: fedora-all [bug 878914]
Affects: epel-all [bug 878915]

Comment 5 Tom Atkinson 2013-02-19 21:53:48 UTC
Anything happening here?

Comment 6 Vincent Danen 2013-02-22 02:44:41 UTC
I do not see that the Fedora maintainers have proceeded with this.  I'll ping on the tracking bugs to see if that maybe reminds them.

Comment 7 Wilmer Jaramillo M. 2013-04-12 21:01:31 UTC
Any progress with this bug?

Comment 8 Wilmer Jaramillo M. 2013-08-09 16:28:56 UTC
Created attachment 784918 [details]
CVE-2012-5533 lighttpd apply patch

SRPMS version that I compile a few months ago and currently in production.

Comment 10 Tazz 2018-03-01 20:20:21 UTC
The previous comment on this bug is for informational and documentation purposes only.

However, someone may want to review it, and close it if it no longer needs Status=New.