Bug 878213 (CVE-2012-5533) - CVE-2012-5533 lighttpd: Denial of Service via malformed Connection headers
Summary: CVE-2012-5533 lighttpd: Denial of Service via malformed Connection headers
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2012-5533
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 878914 878915
Blocks: 878215
TreeView+ depends on / blocked
 
Reported: 2012-11-19 21:05 UTC by Vincent Danen
Modified: 2023-05-11 21:11 UTC (History)
6 users (show)

Fixed In Version: lighttpd 1.4.32
Clone Of:
Environment:
Last Closed: 2018-03-02 13:49:00 UTC
Embargoed:


Attachments (Terms of Use)
upstream patch to correct the flaw (2.94 KB, patch)
2012-11-19 21:07 UTC, Vincent Danen
no flags Details | Diff
CVE-2012-5533 lighttpd apply patch (721.59 KB, application/x-rpm)
2013-08-09 16:28 UTC, Wilmer Jaramillo M.
no flags Details

Description Vincent Danen 2012-11-19 21:05:02 UTC
A flaw was found in lighttpd version 1.4.31 that could be exploited by a remote user to cause a denial of service condition in lighttpd.  A client could send a malformed Connection header to lighttpd (such as "Connection: TE,,Keep-Alive"), which would cause lighttpd to enter an endless loop, detecting an empty token but not incrementing the current string position, causing it to continually read ',' over and over.

This flaw was introduced in 1.4.31 [1] when an "invalid read" bug was fixed [2].

[1] http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2830/diff/
[2] http://redmine.lighttpd.net/issues/2413


Acknowledgement:

Red Hat would like to thank Stefan Bühler for reporting this issue. Upstream acknowledges Jesse Sipprell from McClatchy Interactive, Inc. as the original reporter.

Comment 1 Vincent Danen 2012-11-19 21:07:00 UTC
Created attachment 648125 [details]
upstream patch to correct the flaw

Comment 2 Vincent Danen 2012-11-20 16:44:26 UTC
Note that because lighttpd does not use threads, this would cause the daemon to fully be unresponsive to requests and peg the CPU core it is using to full or near-full utilization.

Comment 4 Jan Lieskovsky 2012-11-21 14:24:00 UTC
Created lighttpd tracking bugs for this issue

Affects: fedora-all [bug 878914]
Affects: epel-all [bug 878915]

Comment 5 Tom Atkinson 2013-02-19 21:53:48 UTC
Anything happening here?

Comment 6 Vincent Danen 2013-02-22 02:44:41 UTC
I do not see that the Fedora maintainers have proceeded with this.  I'll ping on the tracking bugs to see if that maybe reminds them.

Comment 7 Wilmer Jaramillo M. 2013-04-12 21:01:31 UTC
Any progress with this bug?

Comment 8 Wilmer Jaramillo M. 2013-08-09 16:28:56 UTC
Created attachment 784918 [details]
CVE-2012-5533 lighttpd apply patch

SRPMS version that I compile a few months ago and currently in production.

Comment 10 Tazz 2018-03-01 20:20:21 UTC
The previous comment on this bug is for informational and documentation purposes only.

However, someone may want to review it, and close it if it no longer needs Status=New.


Note You need to log in before you can comment on or make changes to this bug.