Integer overflow in lighttpd - CVE-2019-11072
Published: April 24, 2019 / Updated: September 29, 2022
lighttpd
Detailed vulnerability description
The vulnerability allows a remote attacker to perform denial of service attack.
The vulnerability exists due to signed integer overflow when processing "/%2F?" characters in burl_normalize_2F_to_slash_fix() function in burl.c, when url-path-2f-decode option is enabled. A remote attacker can send a specially crafted HTTP GET request to the affected server, trigger integer overflow and crash the service.