DescriptionThe http_request_split_value function in request.c in lighttpd before 1.4.32 allows remote attackers to cause a denial of service (infinite loop) via a request with a header containing an empty token, as demonstrated using the "Connection: TE,,Keep-Alive" header.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lighttpd (PTS)wheezy1.4.31-4+deb7u4fixed
wheezy (security)1.4.31-4+deb7u5fixed
jessie (security), jessie1.4.35-4+deb8u1fixed
buster, stretch1.4.45-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lighttpdsourcesqueeze(not affected)


[squeeze] - lighttpd <not-affected> (Introduced in 1.4.31)

Search for package or bug name: Reporting problems