vulnerability
SUSE: CVE-2022-37797: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Sep 12, 2022 | Oct 26, 2022 | Jan 28, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Sep 12, 2022
Added
Oct 26, 2022
Modified
Jan 28, 2025
Description
In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition.
Solutions
suse-upgrade-lighttpdsuse-upgrade-lighttpd-mod_authn_gssapisuse-upgrade-lighttpd-mod_authn_ldapsuse-upgrade-lighttpd-mod_authn_pamsuse-upgrade-lighttpd-mod_authn_saslsuse-upgrade-lighttpd-mod_magnetsuse-upgrade-lighttpd-mod_maxminddbsuse-upgrade-lighttpd-mod_rrdtoolsuse-upgrade-lighttpd-mod_vhostdb_dbisuse-upgrade-lighttpd-mod_vhostdb_ldapsuse-upgrade-lighttpd-mod_vhostdb_mysqlsuse-upgrade-lighttpd-mod_vhostdb_pgsqlsuse-upgrade-lighttpd-mod_webdav
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.