CVE-2007-4727Improper Restriction of Operations within the Bounds of a Memory Buffer in Lighttpd

Severity
6.8MEDIUMNVD
EPSS
18.2%
top 4.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 12
Latest updateMay 1

Description

Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

debiandebian/lighttpd< lighttpd 1.4.18-1 (bookworm)
Debianlighttpd/lighttpd< 1.4.18-1+3
NVDlighttpd/lighttpd1.4.15

🔴Vulnerability Details

2
GHSA
GHSA-8fr6-p7rj-wmfr: Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi2022-05-01
OSV
CVE-2007-4727: Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi2007-09-12

📋Vendor Advisories

1
Debian
CVE-2007-4727: lighttpd - Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in t...2007

💬Community

1
Bugzilla
CVE-2007-4727 FastCGI header overrun in lighttpd's mod_fastcgi2007-09-10