lighttpd 1.4.31 http_request_split_value Function Header Handling DoS

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server is affected by a denial of service

Description :

According to its banner, the version of lighttpd running on the remote
host is 1.4.31. It is, therefore, affected by a denial of service
vulnerability. An error in the http_request_split_value() function in
'src/request.c' can cause the application to enter an endless loop
when handling specially crafted 'Connection' header requests.

Note that Nessus has not tested for this issue but has instead relied
only on the version in the server's banner.

See also :

Solution :

Upgrade to lighttpd version 1.4.32 or later. Alternatively, apply the
vendor-supplied patch.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.9
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 63094 ()

Bugtraq ID: 56619

CVE ID: CVE-2012-5533

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now