First published: Wed Nov 30 2011(Updated: )
An signedness error, leading to out of stack-based buffer read flaw was found in the way lighttpd, a lightning fast webserver with light system requirements, processed certain invalid base64 HTTP authentication tokens. A remote attacker could provide a specially crafted HTTP authentication request, leading to denial of service (lighttpd daemon crash due to an signedness error while processing the token). Upstream bug report: [1] <a href="http://redmine.lighttpd.net/issues/2370">http://redmine.lighttpd.net/issues/2370</a> Upstream patch (with testcase and NEWS update): [2] <a href="http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2806/diff">http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2806/diff</a> References: [3] <a href="http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2011_01.txt">http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2011_01.txt</a> (upstream advisory) [4] <a href="http://www.openwall.com/lists/oss-security/2011/11/29/8">http://www.openwall.com/lists/oss-security/2011/11/29/8</a> (CVE request) [5] <a href="http://www.openwall.com/lists/oss-security/2011/11/29/13">http://www.openwall.com/lists/oss-security/2011/11/29/13</a> (CVE assignment)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fipsasp Fipscms Light | =1.5.0 | |
Fipsasp Fipscms Light | >=1.4.1<1.4.30 | |
Debian | =5.0 | |
Debian | =7.0 | |
Debian | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4362 is classified as a medium severity vulnerability due to the potential for remote exploitation.
To fix CVE-2011-4362, upgrade lighttpd to version 1.5.1 or later, or apply relevant patches provided by your distribution.
CVE-2011-4362 can lead to stack-based buffer reading, potentially allowing attackers to access sensitive information.
CVE-2011-4362 affects lighttpd versions from 1.4.1 to 1.4.30 and 1.5.0.
Yes, remote attackers can exploit CVE-2011-4362 by sending specially crafted HTTP authentication requests.