lighttpd 1.4.31 http_request_split_value Function Header Handling DoS

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by a denial of service
vulnerability.

Description :

According to its banner, the version of lighttpd running on the remote
host is 1.4.31. It is, therefore, affected by a denial of service
vulnerability. An error in the http_request_split_value() function in
'src/request.c' can cause the application to enter an endless loop
when handling specially crafted 'Connection' header requests.

Note that Nessus has not tested for this issue but has instead relied
only on the version in the server's banner.

See also :

http://www.lighttpd.net/2012/11/21/1-4-32/
http://redmine.lighttpd.net/issues/2413
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt
http://www.nessus.org/u?5d138340

Solution :

Upgrade to lighttpd version 1.4.32 or later. Alternatively, apply the
vendor-supplied patch.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 3.9
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 63094 ()

Bugtraq ID: 56619

CVE ID: CVE-2012-5533