An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-004 |
|
History
Mon, 09 Feb 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections. | |
| Title | Stack Overflow via SESSIONID Cookie in lighttpd | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-02-09T07:39:42.537Z
Reserved: 2026-01-13T08:33:25.683Z
Link: CVE-2026-22903
No data.
Status : Received
Published: 2026-02-09T08:16:10.103
Modified: 2026-02-09T08:16:10.103
Link: CVE-2026-22903
No data.
OpenCVE Enrichment
No data.