CVE-2018-25103
Description
There exists use-after-free vulnerabilities in lighttpd <= 1.4.50 request parsing which might read from invalid pointers to memory used in the same request, not from other requests.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in lighttpd <=1.4.50 request parsing allows remote, unauthenticated memory reads and potential denial-of-service.
Vulnerability
Overview
A use-after-free vulnerability exists in lighttpd versions 1.4.50 and earlier, within the HTTP request parser. The bug occurs when handling folded (continuation) headers: after headers are combined, some internal pointers become stale, leading to reads from freed or invalid memory during the same request [3]. The root cause was an oversight in how data_string pointers were reused after header folding operations, as seen in the patch that introduced proper tracking (current_header) and cleaned up the folding logic [4].
Exploitation
Prerequisites
An unauthenticated attacker can trigger this vulnerability remotely by sending crafted HTTP requests with folded headers. No authentication or special network position is required (CVSS v3.1 score 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) [2]. The attack surface includes any device or system running a vulnerable lighttpd version, which has historically been embedded in numerous IoT devices and baseboard management controllers (BMCs) from vendors such as AMI, Intel, and Lenovo [2][3].
Impact
A successful exploit can lead to two primary outcomes: (1) information disclosure – the server may leak memory contents that could reveal sensitive data, and (2) denial of service – the process can crash due to reading invalid pointers [1][3]. The original disclosure by VDOO in 2018 emphasized the DoS risk, while later analysis by Binarly in 2024 highlighted the information leak potential through string comparison against stale pointers [1][2].
Mitigation
Status
The lighttpd project fixed this vulnerability in version 1.4.51, released in August 2018 [1][3]. The patch is available in commit df8e4f95614e476276a55e34da2aa8b00b1148e9 [4]. However, many products still ship vulnerable versions, creating a supply-chain risk. Organizations are advised to upgrade to lighttpd >=1.4.51 and verify that embedded devices are updated. A CVE ID was only assigned in 2024 (CVE-2018-25103) after the vulnerability was found to still be present in numerous systems [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: lighttpd-1.3.11, lighttpd-1.3.12, lighttpd-1.3.13, …
Patches
2df8e4f95614ed161f53de04bVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- 9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdfnvd
- blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/nvd
- github.com/lighttpd/lighttpd1.4/commit/d161f53de04bc826ce1bdaeb3dce2c72ca50a3f8nvd
- github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9nvd
- www.kb.cert.org/vuls/id/312260nvd
- www.runzero.com/blog/lighttpd/nvd
News mentions
0No linked articles in our index yet.