A flaw was found in lighttpd version 1.4.31 that could be exploited by a remote user to cause a denial of service condition in lighttpd. A client could send a malformed Connection header to lighttpd (such as "Connection: TE,,Keep-Alive"), which would cause lighttpd to enter an endless loop, detecting an empty token but not incrementing the current string position, causing it to continually read ',' over and over. This flaw was introduced in 1.4.31 [1] when an "invalid read" bug was fixed [2]. [1] http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2830/diff/ [2] http://redmine.lighttpd.net/issues/2413 Acknowledgement: Red Hat would like to thank Stefan Bühler for reporting this issue. Upstream acknowledges Jesse Sipprell from McClatchy Interactive, Inc. as the original reporter.
Created attachment 648125 [details] upstream patch to correct the flaw
Note that because lighttpd does not use threads, this would cause the daemon to fully be unresponsive to requests and peg the CPU core it is using to full or near-full utilization.
Public via: http://www.openwall.com/lists/oss-security/2012/11/21/1 Other references: http://www.lighttpd.net/2012/11/21/1-4-32/ http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt
Created lighttpd tracking bugs for this issue Affects: fedora-all [bug 878914] Affects: epel-all [bug 878915]
Anything happening here?
I do not see that the Fedora maintainers have proceeded with this. I'll ping on the tracking bugs to see if that maybe reminds them.
Any progress with this bug?
Created attachment 784918 [details] CVE-2012-5533 lighttpd apply patch SRPMS version that I compile a few months ago and currently in production.
The previous comment on this bug is for informational and documentation purposes only. However, someone may want to review it, and close it if it no longer needs Status=New.