Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-22707

Опубликовано: 06 янв. 2022
Источник: ubuntu
Приоритет: low
CVSS2: 4.3
CVSS3: 5.9

Описание

In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

1.4.64-1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

released

1.4.55-1ubuntu1.20.04.2
esm-apps/jammy

released

1.4.63-1ubuntu3.1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

released

1.4.55-1ubuntu1.20.04.2
hirsute

ignored

end of life
impish

ignored

end of life

Показывать по

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
около 4 лет назад

In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.

CVSS3: 5.9
debian
около 4 лет назад

In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded functi ...

suse-cvrf
около 4 лет назад

Security update for lighttpd

github
около 4 лет назад

In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes), as demonstrated by remote denial of service (daemon crash).

4.3 Medium

CVSS2

5.9 Medium

CVSS3