CVE-2007-4727

NameCVE-2007-4727
DescriptionBuffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1362-1
NVD severitymedium (attack range: remote)
Debian Bugs441555
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lighttpd (PTS)squeeze, squeeze (security)1.4.28-2+squeeze1.6fixed
squeeze (lts)1.4.28-2+squeeze1.7fixed
wheezy (security), wheezy1.4.31-4+deb7u3fixed
stretch, sid, jessie1.4.35-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lighttpdsource(unstable)1.4.18-1medium441555
lighttpdsourceetch1.4.13-4etch4mediumDSA-1362-1

Notes

http://www.lighttpd.net/assets/2007/9/9/lighttpd_sa_2007_12.txt
http://www.lighttpd.net/download/lighttpd-1.4.x_mod_fastcgi_overrun.patch
http://www.milw0rm.com/exploits/4391

Search for package or bug name: Reporting problems