CVE-2022-22707

Publication date 6 January 2022

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.

Read the notes from the security team

Status

Package Ubuntu Release Status
lighttpd 23.04 lunar
Not affected
22.10 kinetic
Not affected
22.04 LTS jammy
Fixed 1.4.63-1ubuntu3.1
21.10 impish Ignored end of life
21.04 hirsute Ignored end of life
20.04 LTS focal
Fixed 1.4.55-1ubuntu1.20.04.2
18.04 LTS bionic
Not affected
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected

Notes


ebarretto

According to upstream the impact is limited to 32-bit lighttpd and to specific lighttpd mod_extforward configurations expected to be rare.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
lighttpd

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-5903-1
    • lighttpd vulnerabilities
    • 28 February 2023

Other references