Integer overflow in lighttpd - CVE-2019-11072

 

Integer overflow in lighttpd - CVE-2019-11072

Published: April 24, 2019 / Updated: September 29, 2022


Vulnerability identifier: #VU18331
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2019-11072
CWE-ID: CWE-190
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: lighttpd
Affected software:
lighttpd

Detailed vulnerability description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to signed integer overflow when processing "/%2F?" characters in burl_normalize_2F_to_slash_fix() function in burl.c, when url-path-2f-decode option is enabled. A remote attacker can send a specially crafted HTTP GET request to the affected server, trigger integer overflow and crash the service.


How to mitigate CVE-2019-11072

Install updates from vendor's repository.

Sources