lighttpd 1.4.31 http_request_split_value Function Header Handling DoS

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server is potentially affected by a denial of service
vulnerability.

Description :

According to its self-reported version, the lighttpd install on the
remote host is 1.4.31 and is, therefore, potentially affected by a
denial of service vulnerability.

An error in the function 'http_request_split_value' in the file
'src/request.c' can cause the application to enter an endless loop when
handling specially crafted 'Connection' header requests.

Note that Nessus has not tested for this issue but has instead relied
only on the version in the server's banner.

See also :

http://www.lighttpd.net/2012/11/21/1-4-32/
http://redmine.lighttpd.net/issues/2413
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt
http://www.nessus.org/u?5d138340

Solution :

Either upgrade to lighttpd version 1.4.32 or later or apply the
vendor's patch.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 63094 ()

Bugtraq ID: 56619

CVE ID: CVE-2012-5533