AI Score
Confidence
Low
EPSS
Percentile
10.6%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial
There exists use-after-free vulnerabilities in lighttpd <= 1.4.50 request parsing which might read from invalid pointers to memory used in the same request, not from other requests.
[
{
"cpes": [
"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*"
],
"vendor": "lighttpd",
"product": "lighttpd",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom",
"lessThanOrEqual": "1.4.50"
}
],
"defaultStatus": "unknown"
}
]
9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf
blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736
github.com/lighttpd/lighttpd1.4/commit/d161f53de04bc826ce1bdaeb3dce2c72ca50a3f8
github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9
www.kb.cert.org/vuls/id/312260
www.runzero.com/blog/lighttpd/