CVE-2007-4727

NameCVE-2007-4727
DescriptionBuffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1362-1
Debian Bugs441555

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lighttpd (PTS)buster1.4.53-4+deb10u2fixed
buster (security)1.4.53-4+deb10u3fixed
bullseye (security), bullseye1.4.59-1+deb11u2fixed
bookworm1.4.69-1fixed
trixie1.4.74-1fixed
sid1.4.74-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lighttpdsourceetch1.4.13-4etch4DSA-1362-1
lighttpdsource(unstable)1.4.18-1medium441555

Notes

http://www.lighttpd.net/assets/2007/9/9/lighttpd_sa_2007_12.txt
http://www.lighttpd.net/download/lighttpd-1.4.x_mod_fastcgi_overrun.patch
http://www.milw0rm.com/exploits/4391

Search for package or bug name: Reporting problems