Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
https://issues.rpath.com/browse/RPL-1715
https://exchange.xforce.ibmcloud.com/vulnerabilities/36526
https://bugzilla.redhat.com/show_bug.cgi?id=284511
http://www.vupen.com/english/advisories/2007/3110
http://www.securityfocus.com/bid/25622
http://www.securityfocus.com/archive/1/479763/100/0/threaded
http://www.novell.com/linux/security/advisories/2007_20_sr.html
http://www.lighttpd.net/assets/2007/9/9/lighttpd_sa_2007_12.txt
http://www.gentoo.org/security/en/glsa/glsa-200709-16.xml
http://trac.lighttpd.net/trac/changeset/1986
http://secweb.se/en/advisories/lighttpd-fastcgi-remote-vulnerability/
http://securityreason.com/securityalert/3127
http://secunia.com/advisories/27229
http://secunia.com/advisories/26997
http://secunia.com/advisories/26824
http://secunia.com/advisories/26794