Vulnerability Description
In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lighttpd | Lighttpd | >= 1.4.46, <= 1.4.63 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://redmine.lighttpd.net/issues/3134ExploitVendor Advisory
- https://www.debian.org/security/2022/dsa-5040Third Party Advisory
- https://redmine.lighttpd.net/issues/3134ExploitVendor Advisory
- https://www.debian.org/security/2022/dsa-5040Third Party Advisory
FAQ
What is CVE-2022-22707?
CVE-2022-22707 is a vulnerability with a CVSS score of 5.9 (MEDIUM). In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of s...
How severe is CVE-2022-22707?
CVE-2022-22707 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-22707?
Check the references section above for vendor advisories and patch information. Affected products include: Lighttpd Lighttpd, Debian Debian Linux.