Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-30780

Опубликовано: 11 июн. 2022
Источник: debian

Описание

Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lighttpdfixed1.4.59-1package
lighttpdnot-affectedbusterpackage
lighttpdnot-affectedstretchpackage

Примечания

  • https://podalirius.net/en/cves/2022-30780/

  • https://github.com/p0dalirius/CVE-2022-30780-lighttpd-denial-of-service

  • https://redmine.lighttpd.net/issues/3059

  • Fixed by: https://github.com/lighttpd/lighttpd1.4/commit/b03b86f47b0d5a553137f081fadc482b4af1372d (lighttpd-1.4.59)

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.

CVSS3: 7.5
nvd
больше 3 лет назад

Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.

CVSS3: 7.5
github
больше 3 лет назад

Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.