blob: 5fc972f79ec5c32d99c72d7638d7102596cea5c8 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200411-02">
<title>Cherokee: Format string vulnerability</title>
Cherokee contains a format string vulnerability that could lead to denial
of service or the execution of arbitary code.
<product type="ebuild">cherokee</product>
<announced>November 01, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="www-servers/cherokee" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="le">0.4.17</vulnerable>
Cherokee is an extra-light web server.
Florian Schilhabel from the Gentoo Linux Security Audit Team found a
format string vulnerability in the cherokee_logger_ncsa_write_string()
<impact type="high">
Using a specially crafted URL when authenticating via auth_pam, a
malicious user may be able to crash the server or execute arbitrary
code on the target machine with permissions of the user running
There is no known workaround at this time.
All Cherokee users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-servers/cherokee-;</code>
<uri link="">CVE-2004-1097</uri>
<metadata tag="requester" timestamp="Mon, 1 Nov 2004 10:17:11 +0000">
<metadata tag="bugReady" timestamp="Mon, 1 Nov 2004 11:49:51 +0000">
<metadata tag="submitter" timestamp="Mon, 1 Nov 2004 15:51:07 +0000">