blob: 13fab843a48d08fd0eaaf36296c3400cb395ac90 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200708-11">
<title>Lighttpd: Multiple vulnerabilities</title>
Several vulnerabilities were reported in Lighttpd, most of them allowing a
Denial of Service and potentially the remote execution of arbitrary code.
<product type="ebuild">lighttpd</product>
<announced>August 16, 2007</announced>
<revised>August 16, 2007: 01</revised>
<package name="www-servers/lighttpd" auto="yes" arch="*">
<unaffected range="ge">1.4.16</unaffected>
<vulnerable range="lt">1.4.16</vulnerable>
Lighttpd is a lightweight HTTP web server.
Stefan Esser discovered errors with evidence of memory corruption in
the code parsing the headers. Several independent researchers also
reported errors involving the handling of HTTP headers, the mod_auth
and mod_scgi modules, and the limitation of active connections.
<impact type="normal">
A remote attacker can trigger any of these vulnerabilities by sending
malicious data to the server, which may lead to a crash or memory
exhaustion, and potentially the execution of arbitrary code.
Additionally, access-deny settings can be evaded by appending a final /
to a URL.
There is no known workaround at this time.
All Lighttpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.16&quot;</code>
<uri link="">CVE-2007-3946</uri>
<uri link="">CVE-2007-3947</uri>
<uri link="">CVE-2007-3948</uri>
<uri link="">CVE-2007-3949</uri>
<uri link="">CVE-2007-3950</uri>
<metadata tag="requester" timestamp="Tue, 17 Jul 2007 18:07:17 +0000">
<metadata tag="submitter" timestamp="Sun, 12 Aug 2007 21:28:06 +0000">
<metadata tag="bugReady" timestamp="Wed, 15 Aug 2007 05:43:43 +0000">