Lucene search

K

Fedora 12 : lighttpd-1.4.26-2.fc12 (2010-7643)

πŸ—“οΈΒ 01 Jul 2010Β 00:00:00Reported byΒ This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.TypeΒ 
nessus
Β nessus
πŸ”—Β www.tenable.comπŸ‘Β 12Β Views

Update lighttpd to the latest version of the 1.4 branch, with the spawn-fcgi program split out for the first time on EL. This fixes CVE-2010-0295 and also includes a fix for upstream bug #2157 where SSL stopped working with RHEL 5.4. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Prion
Design/Logic Flaw
3 Feb 201019:30
–prion
securityvulns
[SECURITY] [DSA 1987-1] New lighttpd packages fix denial of service
2 Feb 201000:00
–securityvulns
securityvulns
lighttpd DoS
2 Feb 201000:00
–securityvulns
Fedora
[SECURITY] Fedora 11 Update: lighttpd-1.4.26-2.fc11
12 May 201017:54
–fedora
Fedora
[SECURITY] Fedora 12 Update: lighttpd-1.4.26-2.fc12
12 May 201018:02
–fedora
Fedora
[SECURITY] Fedora 13 Update: lighttpd-1.4.26-2.fc13
12 May 201017:59
–fedora
Tenable Nessus
GLSA-201006-17 : lighttpd: Denial of Service
4 Jun 201000:00
–nessus
Tenable Nessus
lighttpd < 1.4.26 or 1.5.0 Denial of Service
6 Feb 201800:00
–nessus
Tenable Nessus
Fedora 13 : lighttpd-1.4.26-2.fc13 (2010-7611)
1 Jul 201000:00
–nessus
Tenable Nessus
Fedora 11 : lighttpd-1.4.26-2.fc11 (2010-7636)
1 Jul 201000:00
–nessus
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2010-7643.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(47469);
  script_version("1.11");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2010-0295");
  script_xref(name:"FEDORA", value:"2010-7643");

  script_name(english:"Fedora 12 : lighttpd-1.4.26-2.fc12 (2010-7643)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Update lighttpd to the latest version of the 1.4 branch, with the
spawn-fcgi program split out for the first time on EL. This fixes
CVE-2010-0295 and also includes a fix for upstream bug #2157 where SSL
stopped working with RHEL 5.4.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=561340"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2010-May/041307.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?fd6b3d88"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected lighttpd package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_cwe_id(399);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:lighttpd");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:12");

  script_set_attribute(attribute:"patch_publication_date", value:"2010/04/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^12([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 12.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC12", reference:"lighttpd-1.4.26-2.fc12")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "lighttpd");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Jul 2010 00:00Current
9.5High risk
Vulners AI Score9.5
CVSS25.0
EPSS0.074
12
.json
Report