Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Link | Tags |
---|---|
https://github.com/lighttpd/lighttpd1.4 | third party advisory product |
https://redmine.lighttpd.net/issues/3059 | issue tracking patch vendor advisory |
https://podalirius.net/en/cves/2022-30780/ | third party advisory exploit |
https://github.com/p0dalirius/CVE-2022-30780-lighttpd-denial-of-service | third party advisory exploit |