Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.
History

Mon, 09 Feb 2026 08:00:00 +0000

Type Values Removed Values Added
Description Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.
Title Stack Overflow via Oversized Cookie Fields in lighttpd
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-02-09T07:40:00.484Z

Reserved: 2026-01-13T08:33:25.683Z

Link: CVE-2026-22904

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-09T08:16:11.387

Modified: 2026-02-09T08:16:11.387

Link: CVE-2026-22904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.