Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-22707

Published: 6 January 2022

In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.

Notes

AuthorNote
ebarretto
According to upstream the impact is limited to 32-bit lighttpd
and to specific lighttpd mod_extforward configurations expected
to be rare.

Priority

Low

Cvss 3 Severity Score

5.9

Score breakdown

Status

Package Release Status
lighttpd
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal
Released (1.4.55-1ubuntu1.20.04.2)
hirsute Ignored
(end of life)
impish Ignored
(end of life)
jammy
Released (1.4.63-1ubuntu3.1)
kinetic Not vulnerable
(1.4.64-1)
lunar Not vulnerable
(1.4.64-1)
trusty Not vulnerable
(code not present)
upstream Needs triage

xenial Not vulnerable
(code not present)
Patches:
upstream: https://github.com/lighttpd/lighttpd1.4/commit/8c62a890e23f5853b1a562b03fe3e1bccc6e7664

Severity score breakdown

Parameter Value
Base score 5.9
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H