In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://logicaltrust.net/blog/2019/11/cherokee.html | third party advisory exploit |
https://github.com/cherokee/webserver/issues/1224 | third party advisory exploit |
https://security.gentoo.org/glsa/202012-09 | third party advisory vendor advisory |