Debian DSA-1987-1: lighttpd - denial of service due to bad memory handling. Upgrading lighttpd is the solution
Reporter | Title | Published | Views | Family All 41 |
---|---|---|---|---|
Fedora | [SECURITY] Fedora 11 Update: lighttpd-1.4.26-2.fc11 | 12 May 201017:54 | β | fedora |
Fedora | [SECURITY] Fedora 12 Update: lighttpd-1.4.26-2.fc12 | 12 May 201018:02 | β | fedora |
Fedora | [SECURITY] Fedora 13 Update: lighttpd-1.4.26-2.fc13 | 12 May 201017:59 | β | fedora |
securityvulns | [SECURITY] [DSA 1987-1] New lighttpd packages fix denial of service | 2 Feb 201000:00 | β | securityvulns |
securityvulns | lighttpd DoS | 2 Feb 201000:00 | β | securityvulns |
Prion | Design/Logic Flaw | 3 Feb 201019:30 | β | prion |
OpenVAS | Llighttpd < 1.4.26 'Slow Request Handling' Remote DoS Vulnerability | 2 Feb 201000:00 | β | openvas |
OpenVAS | Debian: Security Advisory (DSA-1987-1) | 10 Feb 201000:00 | β | openvas |
OpenVAS | Debian Security Advisory DSA 1987-1 (lighttpd) | 10 Feb 201000:00 | β | openvas |
OpenVAS | FreeBSD Ports: lighttpd | 18 Feb 201000:00 | β | openvas |
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
debian | www.debian.org/security/2010/dsa-1987 |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-1987. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(44851);
script_version("1.11");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2010-0295");
script_bugtraq_id(38036);
script_xref(name:"DSA", value:"1987");
script_name(english:"Debian DSA-1987-1 : lighttpd - denial of service");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Li Ming discovered that lighttpd, a small and fast webserver with
minimal memory footprint, is vulnerable to a denial of service attack
due to bad memory handling. Slowly sending very small chunks of
request data causes lighttpd to allocate new buffers for each read
instead of appending to old ones. An attacker can abuse this behaviour
to cause denial of service conditions due to memory exhaustion."
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2010/dsa-1987"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the lighttpd packages.
For the oldstable distribution (etch), this problem has been fixed in
version 1.4.13-4etch12.
For the stable distribution (lenny), this problem has been fixed in
version 1.4.19-5+lenny1."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:lighttpd");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:5.0");
script_set_attribute(attribute:"patch_publication_date", value:"2010/02/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/02/24");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"4.0", prefix:"lighttpd", reference:"1.4.13-4etch12")) flag++;
if (deb_check(release:"4.0", prefix:"lighttpd-doc", reference:"1.4.13-4etch12")) flag++;
if (deb_check(release:"4.0", prefix:"lighttpd-mod-cml", reference:"1.4.13-4etch12")) flag++;
if (deb_check(release:"4.0", prefix:"lighttpd-mod-magnet", reference:"1.4.13-4etch12")) flag++;
if (deb_check(release:"4.0", prefix:"lighttpd-mod-mysql-vhost", reference:"1.4.13-4etch12")) flag++;
if (deb_check(release:"4.0", prefix:"lighttpd-mod-trigger-b4-dl", reference:"1.4.13-4etch12")) flag++;
if (deb_check(release:"4.0", prefix:"lighttpd-mod-webdav", reference:"1.4.13-4etch12")) flag++;
if (deb_check(release:"5.0", prefix:"lighttpd", reference:"1.4.19-5+lenny1")) flag++;
if (deb_check(release:"5.0", prefix:"lighttpd-doc", reference:"1.4.19-5+lenny1")) flag++;
if (deb_check(release:"5.0", prefix:"lighttpd-mod-cml", reference:"1.4.19-5+lenny1")) flag++;
if (deb_check(release:"5.0", prefix:"lighttpd-mod-magnet", reference:"1.4.19-5+lenny1")) flag++;
if (deb_check(release:"5.0", prefix:"lighttpd-mod-mysql-vhost", reference:"1.4.19-5+lenny1")) flag++;
if (deb_check(release:"5.0", prefix:"lighttpd-mod-trigger-b4-dl", reference:"1.4.19-5+lenny1")) flag++;
if (deb_check(release:"5.0", prefix:"lighttpd-mod-webdav", reference:"1.4.19-5+lenny1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo