Executive Summary

Summary
TitleLighttpd: Buffer overflow
Informations
NameGLSA-200709-16First vendor Publication2007-09-27
VendorGentooLast vendor Modification2007-09-27
Severity (Vendor) HighRevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Lighttpd is vulnerable to the remote execution of arbitrary code.

Background

Lighttpd is a lightweight HTTP web server.

Description

Mattias Bengtsson and Philip Olausson have discovered a buffer overflow vulnerability in the function fcgi_env_add() in the file mod_fastcgi.c when processing overly long HTTP headers.

Impact

A remote attacker could send a specially crafted request to the vulnerable Lighttpd server, resulting in the remote execution of arbitrary code with privileges of the user running the web server. Note that mod_fastcgi is disabled in Gentoo's default configuration.

Workaround

Edit the file /etc/lighttpd/lighttpd.conf and comment the following line: "include mod_fastcgi.conf"

Resolution

All Lighttpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.18"

References

[ 1 ] CVE-2007-4727 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200709-16.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-200709-16.xml

CWE : Common Weakness Enumeration

idName
CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

OpenVAS Exploits

DateDescription
2009-02-27Name : Fedora Update for lighttpd FEDORA-2007-2132
File : nvt/gb_fedora_2007_2132_lighttpd_fc7.nasl
2008-09-24Name : Gentoo Security Advisory GLSA 200709-16 (lighttpd)
File : nvt/glsa_200709_16.nasl
2008-09-24Name : Gentoo Security Advisory GLSA 200710-02 (php)
File : nvt/glsa_200710_02.nasl
2008-09-04Name : FreeBSD Ports: lighttpd
File : nvt/freebsd_lighttpd0.nasl
2008-01-17Name : Debian Security Advisory DSA 1362-2 (lighttpd)
File : nvt/deb_1362_2.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
36933lighttpd mod_fastcgi HTTP Request Header Overflow

Snort® IPS/IDS

DateDescription
2014-01-10Lighttpd mod_fastcgi Extension CGI Variable Overwriting Vulnerability attempt
RuleID : 17386 - Revision : 8 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

DateDescription
2007-11-06Name : The remote Fedora host is missing a security update.
File : fedora_2007-2132.nasl - Type : ACT_GATHER_INFO
2007-10-17Name : The remote SuSE system is missing the security patch lighttpd-4532
File : suse_lighttpd-4532.nasl - Type : ACT_GATHER_INFO
2007-10-09Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200710-02.nasl - Type : ACT_GATHER_INFO
2007-10-03Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200709-16.nasl - Type : ACT_GATHER_INFO
2007-09-17Name : The remote web server is susceptible to a buffer overflow vulnerability.
File : lighttpd_fastcgi_overflow.nasl - Type : ACT_ATTACK
2007-09-14Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_4b673ae75f9a11dc84dd000102cc8983.nasl - Type : ACT_GATHER_INFO
2007-09-03Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1362.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:35:08
  • Multiple Updates