Lucene search

K
amazonAmazonALAS-2014-353
HistoryJun 15, 2014 - 4:17 p.m.

Important: libmicrohttpd

2014-06-1516:17:00
alas.aws.amazon.com
11

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.039 Low

EPSS

Percentile

92.0%

Issue Overview:

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.

The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read.

Affected Packages:

libmicrohttpd

Issue Correction:
Run yum update libmicrohttpd to update your system.

New Packages:

i686:  
    libmicrohttpd-devel-0.9.33-2.3.amzn1.i686  
    libmicrohttpd-0.9.33-2.3.amzn1.i686  
    libmicrohttpd-debuginfo-0.9.33-2.3.amzn1.i686  
  
noarch:  
    libmicrohttpd-doc-0.9.33-2.3.amzn1.noarch  
  
src:  
    libmicrohttpd-0.9.33-2.3.amzn1.src  
  
x86_64:  
    libmicrohttpd-devel-0.9.33-2.3.amzn1.x86_64  
    libmicrohttpd-0.9.33-2.3.amzn1.x86_64  
    libmicrohttpd-debuginfo-0.9.33-2.3.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-7038, CVE-2013-7039

Mitre: CVE-2013-7038, CVE-2013-7039

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

0.039 Low

EPSS

Percentile

92.0%