First published: Wed Nov 30 2011(Updated: )
An signedness error, leading to out of stack-based buffer read flaw was found in the way lighttpd, a lightning fast webserver with light system requirements, processed certain invalid base64 HTTP authentication tokens. A remote attacker could provide a specially crafted HTTP authentication request, leading to denial of service (lighttpd daemon crash due to an signedness error while processing the token). Upstream bug report: [1] <a href="http://redmine.lighttpd.net/issues/2370">http://redmine.lighttpd.net/issues/2370</a> Upstream patch (with testcase and NEWS update): [2] <a href="http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2806/diff">http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2806/diff</a> References: [3] <a href="http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2011_01.txt">http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2011_01.txt</a> (upstream advisory) [4] <a href="http://www.openwall.com/lists/oss-security/2011/11/29/8">http://www.openwall.com/lists/oss-security/2011/11/29/8</a> (CVE request) [5] <a href="http://www.openwall.com/lists/oss-security/2011/11/29/13">http://www.openwall.com/lists/oss-security/2011/11/29/13</a> (CVE assignment)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lighttpd Lighttpd | =1.5.0 | |
Lighttpd Lighttpd | >=1.4.1<1.4.30 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.