Vulnerability Description
Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lighttpd | Lighttpd | <= 1.4.15 |
Related Weaknesses (CWE)
References
- http://fedoranews.org/updates/FEDORA-2007-213.shtml
- http://secunia.com/advisories/26732Vendor Advisory
- http://secunia.com/advisories/26794
- http://secunia.com/advisories/26824
- http://secunia.com/advisories/26997
- http://secunia.com/advisories/27229
- http://securityreason.com/securityalert/3127
- http://secweb.se/en/advisories/lighttpd-fastcgi-remote-vulnerability/
- http://trac.lighttpd.net/trac/changeset/1986
- http://www.gentoo.org/security/en/glsa/glsa-200709-16.xml
- http://www.lighttpd.net/assets/2007/9/9/lighttpd_sa_2007_12.txt
- http://www.novell.com/linux/security/advisories/2007_20_sr.html
- http://www.securityfocus.com/archive/1/479763/100/0/threaded
- http://www.securityfocus.com/bid/25622
- http://www.vupen.com/english/advisories/2007/3110
FAQ
What is CVE-2007-4727?
CVE-2007-4727 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and exec...
How severe is CVE-2007-4727?
CVE-2007-4727 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4727?
Check the references section above for vendor advisories and patch information. Affected products include: Lighttpd Lighttpd.