lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.
lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
secunia.com/advisories/29066
secunia.com/advisories/29166
secunia.com/advisories/29209
secunia.com/advisories/29268
secunia.com/advisories/29622
secunia.com/advisories/31104
security.gentoo.org/glsa/glsa-200803-10.xml
trac.lighttpd.net/trac/ticket/1562
wiki.rpath.com/Advisories:rPSA-2008-0084
www.debian.org/security/2008/dsa-1609
www.securityfocus.com/archive/1/488926/100/0/threaded
www.securityfocus.com/bid/27943
www.vupen.com/english/advisories/2008/0659/references
issues.rpath.com/browse/RPL-2284
www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html
www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html