CVE-2012-5533
Publication date 24 November 2012
Last updated 24 July 2024
Ubuntu priority
The http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
Status
Package | Ubuntu Release | Status |
---|---|---|
lighttpd | ||
Patch details
Package | Patch details |
---|---|
lighttpd |
References
Other references
- http://www.securitytracker.com/id?1027802
- http://www.openwall.com/lists/oss-security/2012/11/21/1
- http://www.exploit-db.com/exploits/22902
- http://secunia.com/advisories/51298
- http://secunia.com/advisories/51268
- http://osvdb.org/87623
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00044.html
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch
- https://www.cve.org/CVERecord?id=CVE-2012-5533