CVE-2019-11072Integer Overflow or Wraparound in Lighttpd

Severity
9.8CRITICALNVD
EPSS
12.1%
top 6.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 10
Latest updateMay 14

Description

lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states "The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/lighttpd< lighttpd 1.4.53-4 (bookworm)
Debianlighttpd/lighttpd< 1.4.53-4+3
NVDlighttpd/lighttpd1.4.53

Patches

🔴Vulnerability Details

3
GHSA
GHSA-59gp-rjv5-p2h6: ** DISPUTED ** lighttpd before 12022-05-14
OSV
CVE-2019-11072: lighttpd before 12019-04-10
CVEList
CVE-2019-11072: lighttpd before 12019-04-10

📋Vendor Advisories

1
Debian
CVE-2019-11072: lighttpd - lighttpd before 1.4.54 has a signed integer overflow, which might allow remote a...2019

💬Community

3
Bugzilla
CVE-2019-11072 lighttpd: signed integer overflow causing denial of service [fedora-all]2019-04-15
Bugzilla
CVE-2019-11072 lighttpd: signed integer overflow causing denial of service2019-04-15
Bugzilla
CVE-2019-11072 lighttpd: signed integer overflow causing denial of service [epel-all]2019-04-15