Executive Summary

Summary
Title New lighttpd packages fix buffer overflow
Informations
Name DSA-1362 First vendor Publication 2007-08-29
Vendor Debian Last vendor Modification 2007-10-07
Severity (Vendor) N/A Revision 2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:C)
Cvss Base Score 8.3 Attack Range Network
Cvss Impact Score 8.5 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A problem was discovered in lighttpd, a fast webserver with minimal memory footprint, which could allow the execution of arbitary code via the overflow of CGI variables when mod_fcgi was enabled.

This updated advisory correctly patches the security issue, which was not handled in DSA-1362-1.

For the stable distribution (etch), this problem has been fixed in version 1.4.13-4etch4.

We recommend that you upgrade your lighttpd package.

Original Source

Url : http://www.debian.org/security/2007/dsa-1362

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 55

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200708-11 (lighttpd)
File : nvt/glsa_200708_11.nasl
2008-09-04 Name : FreeBSD Ports: lighttpd
File : nvt/freebsd_lighttpd1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1362-1 (lighttpd)
File : nvt/deb_1362_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1362-2 (lighttpd)
File : nvt/deb_1362_2.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
38317 lighttpd mod_auth (http_auth.c) Malformed Auth-Digest Header Remote DoS

38316 lighttpd mod_auth (http_auth.c) base64_decode Handling Remote DoS

38315 lighttpd mod_auth (http_auth.c) Malformed md5-sess Remote DoS

38314 lighttpd mod_auth (http_auth.c) Unspecified Memory Leak DoS

38313 lighttpd request.c Malformed HTTP Request Remote DoS

38311 lighttpd mod_access.c Crafted URL url.access-deny Bypass

38310 lighttpd mod_webdav Debug Message Format Specifier Unspecified DoS

38309 lighttpd mod_fastcgi Debug Message Format Specifier Unspecified DoS

38308 lighttpd mod_scgi Debug Message Format Specifier Unspecified DoS

Nessus® Vulnerability Scanner

Date Description
2018-02-06 Name : The remote web server is affected by multiple vulnerabilities.
File : lighttpd_1_4_16.nasl - Type : ACT_GATHER_INFO
2007-10-17 Name : The remote openSUSE host is missing a security update.
File : suse_lighttpd-3985.nasl - Type : ACT_GATHER_INFO
2007-09-03 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1362.nasl - Type : ACT_GATHER_INFO
2007-08-21 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200708-11.nasl - Type : ACT_GATHER_INFO
2007-07-27 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_fc9c217e379111dcbb1a000fea449b8a.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:26:51
  • Multiple Updates