Vulnerability Details : CVE-2018-25103
There exists use-after-free vulnerabilities in lighttpd <= 1.4.50 request parsing which might read from invalid pointers to memory used in the same request, not from other requests.
Vulnerability category: Memory Corruption
Products affected by CVE-2018-25103
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2018-25103
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-25103
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-07-03 |
References for CVE-2018-25103
-
https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736
Giving Back – Securing Open Source IoT Projects – VDOO
-
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf
-
https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9
[core,security] process headers after combining folded headers · lighttpd/lighttpd1.4@df8e4f9 · GitHub
-
https://www.runzero.com/blog/lighttpd/
How to find outdated lighttpd services - runZero
-
https://www.kb.cert.org/vuls/id/312260
VU#312260 - Use-after-free vulnerability in lighttpd version 1.4.50 and earlier
-
https://github.com/lighttpd/lighttpd1.4/commit/d161f53de04bc826ce1bdaeb3dce2c72ca50a3f8
[core] security: use-after-free invalid Range req · lighttpd/lighttpd1.4@d161f53 · GitHub
-
https://www.binarly.io/blog/lighttpd-gains-new-life
lighttpd vulnerability unfixed since 2018
Jump to