CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
57.7%
Issue Overview:
In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition. (CVE-2022-37797)
Affected Packages:
lighttpd
Issue Correction:
Run yum update lighttpd to update your system.
New Packages:
i686:
lighttpd-mod_authn_gssapi-1.4.53-1.37.amzn1.i686
lighttpd-debuginfo-1.4.53-1.37.amzn1.i686
lighttpd-fastcgi-1.4.53-1.37.amzn1.i686
lighttpd-mod_mysql_vhost-1.4.53-1.37.amzn1.i686
lighttpd-1.4.53-1.37.amzn1.i686
lighttpd-mod_authn_mysql-1.4.53-1.37.amzn1.i686
lighttpd-mod_geoip-1.4.53-1.37.amzn1.i686
lighttpd-mod_authn_pam-1.4.53-1.37.amzn1.i686
src:
lighttpd-1.4.53-1.37.amzn1.src
x86_64:
lighttpd-fastcgi-1.4.53-1.37.amzn1.x86_64
lighttpd-mod_authn_mysql-1.4.53-1.37.amzn1.x86_64
lighttpd-mod_geoip-1.4.53-1.37.amzn1.x86_64
lighttpd-mod_authn_gssapi-1.4.53-1.37.amzn1.x86_64
lighttpd-mod_authn_pam-1.4.53-1.37.amzn1.x86_64
lighttpd-mod_mysql_vhost-1.4.53-1.37.amzn1.x86_64
lighttpd-debuginfo-1.4.53-1.37.amzn1.x86_64
lighttpd-1.4.53-1.37.amzn1.x86_64
Red Hat: CVE-2022-37797
Mitre: CVE-2022-37797