Lucene search

K
gentooGentoo FoundationGLSA-200709-16
HistorySep 27, 2007 - 12:00 a.m.

Lighttpd: Buffer overflow

2007-09-2700:00:00
Gentoo Foundation
security.gentoo.org
24

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.306 Low

EPSS

Percentile

96.9%

Background

Lighttpd is a lightweight HTTP web server.

Description

Mattias Bengtsson and Philip Olausson have discovered a buffer overflow vulnerability in the function fcgi_env_add() in the file mod_fastcgi.c when processing overly long HTTP headers.

Impact

A remote attacker could send a specially crafted request to the vulnerable Lighttpd server, resulting in the remote execution of arbitrary code with privileges of the user running the web server. Note that mod_fastcgi is disabled in Gentoo’s default configuration.

Workaround

Edit the file /etc/lighttpd/lighttpd.conf and comment the following line: “include mod_fastcgi.conf”

Resolution

All Lighttpd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.18"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-servers/lighttpd< 1.4.18UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.306 Low

EPSS

Percentile

96.9%