Computer Security
[EN] securityvulns.ru no-pyccku


lighttpd buffer overflow
Published:14.09.2007
Source:
SecurityVulns ID:8154
Type:remote
Threat Level:
6/10
Description:mod_fastcgi buffer overflow on headers parsing.
Affected:LIGHTTPD : lighttpd 1.4
CVE:CVE-2007-4727 (Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow.")
Original documentdocumentRPATH, [Full-disclosure] rPSA-2007-0183-1 lighttpd (14.09.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod