Vulnerability Name:

CVE-2007-4727 (CCN-36526)

Assigned:2007-09-09
Published:2007-09-09
Updated:2018-10-15
Summary:Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-4727

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-2132

Source: CCN
Type: SA26732
lighttpd mod_fastcgi PHP Header Overflow

Source: SECUNIA
Type: Vendor Advisory
26732

Source: SECUNIA
Type: UNKNOWN
26794

Source: SECUNIA
Type: UNKNOWN
26824

Source: SECUNIA
Type: UNKNOWN
26997

Source: SECUNIA
Type: UNKNOWN
27229

Source: SREASON
Type: UNKNOWN
3127

Source: CCN
Type: Secweb Web site
Lighttpd FastCGI Remote Vulnerability

Source: MISC
Type: UNKNOWN
http://secweb.se/en/advisories/lighttpd-fastcgi-remote-vulnerability/

Source: CONFIRM
Type: UNKNOWN
http://trac.lighttpd.net/trac/changeset/1986

Source: DEBIAN
Type: DSA-1362
lighttpd -- several vulnerabilities

Source: CCN
Type: GLSA-200709-16
Lighttpd: Buffer overflow

Source: GENTOO
Type: UNKNOWN
GLSA-200709-16

Source: CCN
Type: GLSA-200710-02
PHP: Multiple vulnerabilities

Source: CCN
Type: lighttpd Web site
lighttpd fly light

Source: CONFIRM
Type: UNKNOWN
http://www.lighttpd.net/assets/2007/9/9/lighttpd_sa_2007_12.txt

Source: SUSE
Type: UNKNOWN
SUSE-SR:2007:020

Source: CCN
Type: OSVDB ID: 36933
lighttpd mod_fastcgi HTTP Request Header Overflow

Source: BUGTRAQ
Type: UNKNOWN
20070917 FLEA-2007-0054-1 lighttpd

Source: BID
Type: UNKNOWN
25622

Source: CCN
Type: BID-25622
Lighttpd Mod_FastCGI Request Headers Remote Header Overflow Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2007-3110

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=284511

Source: XF
Type: UNKNOWN
lighttpd-modfastcgi-code-execution(36526)

Source: XF
Type: UNKNOWN
lighttpd-modfastcgi-code-execution(36526)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1715

Source: SUSE
Type: SUSE-SR:2007:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:lighttpd:lighttpd:*:*:*:*:*:*:*:* (Version <= 1.4.15)

  • Configuration CCN 1:
  • cpe:/a:lighttpd:lighttpd:1.4.17:*:*:*:*:*:*:*
  • AND
  • cpe:/o:suse:suse_linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20074727
    V
    CVE-2007-4727
    2015-11-16
    oval:org.mitre.oval:def:18620
    P
    DSA-1362-1 lighttpd - several vulnerabilities
    2014-06-23
    oval:org.debian:def:1362
    V
    several vulnerabilities
    2007-08-29
    BACK
    lighttpd lighttpd *
    lighttpd lighttpd 1.4.17
    suse suse linux *
    gentoo linux *
    debian debian linux 4.0