Update lighttpd to the latest version of the 1.4 branch, fixes CVE-2010-0295 and includes a fix for SSL issue with RHEL 5.4
Reporter | Title | Published | Views | Family All 41 |
---|---|---|---|---|
Fedora | [SECURITY] Fedora 11 Update: lighttpd-1.4.26-2.fc11 | 12 May 201017:54 | β | fedora |
Fedora | [SECURITY] Fedora 12 Update: lighttpd-1.4.26-2.fc12 | 12 May 201018:02 | β | fedora |
Fedora | [SECURITY] Fedora 13 Update: lighttpd-1.4.26-2.fc13 | 12 May 201017:59 | β | fedora |
securityvulns | [SECURITY] [DSA 1987-1] New lighttpd packages fix denial of service | 2 Feb 201000:00 | β | securityvulns |
securityvulns | lighttpd DoS | 2 Feb 201000:00 | β | securityvulns |
Prion | Design/Logic Flaw | 3 Feb 201019:30 | β | prion |
Tenable Nessus | GLSA-201006-17 : lighttpd: Denial of Service | 4 Jun 201000:00 | β | nessus |
Tenable Nessus | Fedora 12 : lighttpd-1.4.26-2.fc12 (2010-7643) | 1 Jul 201000:00 | β | nessus |
Tenable Nessus | Debian DSA-1987-1 : lighttpd - denial of service | 24 Feb 201000:00 | β | nessus |
Tenable Nessus | Fedora 11 : lighttpd-1.4.26-2.fc11 (2010-7636) | 1 Jul 201000:00 | β | nessus |
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
nessus | www.nessus.org/u |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2010-7611.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(47464);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2010-0295");
script_xref(name:"FEDORA", value:"2010-7611");
script_name(english:"Fedora 13 : lighttpd-1.4.26-2.fc13 (2010-7611)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Update lighttpd to the latest version of the 1.4 branch, with the
spawn-fcgi program split out for the first time on EL. This fixes
CVE-2010-0295 and also includes a fix for upstream bug #2157 where SSL
stopped working with RHEL 5.4.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=561340"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2010-May/041296.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?31748124"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected lighttpd package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_cwe_id(399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:lighttpd");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13");
script_set_attribute(attribute:"patch_publication_date", value:"2010/04/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC13", reference:"lighttpd-1.4.26-2.fc13")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "lighttpd");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo