blob: 1faca26e465c1b675a08acf4979dd410ac36ffda [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200812-04">
<title>lighttpd: Multiple vulnerabilities</title>
Multiple vulnerabilities in lighttpd may lead to information disclosure or
a Denial of Service.
<product type="ebuild">lighttpd</product>
<announced>December 02, 2008</announced>
<revised>December 02, 2008: 01</revised>
<package name="www-servers/lighttpd" auto="yes" arch="*">
<unaffected range="ge">1.4.20</unaffected>
<vulnerable range="lt">1.4.20</vulnerable>
lighttpd is a lightweight high-performance web server.
Multiple vulnerabilities have been reported in lighttpd:
Qhy reported a memory leak in the http_request_parse() function in
request.c (CVE-2008-4298).
Gaetan Bisson reported that URIs are not decoded before applying
url.redirect and url.rewrite rules (CVE-2008-4359).
Anders1 reported that mod_userdir performs case-sensitive comparisons
on filename components in configuration options, which is insufficient
when case-insensitive filesystems are used (CVE-2008-4360).
<impact type="normal">
A remote attacker could exploit these vulnerabilities to cause a Denial
of Service, to bypass intended access restrictions, to obtain sensitive
information, or to possibly modify data.
There is no known workaround at this time.
All lighttpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.20&quot;</code>
<uri link="">CVE-2008-4298</uri>
<uri link="">CVE-2008-4359</uri>
<uri link="">CVE-2008-4360</uri>
<metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:41:57 +0000">
<metadata tag="submitter" timestamp="Wed, 26 Nov 2008 22:38:27 +0000">
<metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 22:39:43 +0000">