Update lighttpd to the latest version of the 1.4 branch, with the spawn-fcgi program split out for the first time on EL. This fixes CVE-2010-0295 and also includes a fix for upstream bug #2157 where SSL stopped working with RHEL 5.4. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues
Reporter | Title | Published | Views | Family All 41 |
---|---|---|---|---|
Prion | Design/Logic Flaw | 3 Feb 201019:30 | β | prion |
securityvulns | [SECURITY] [DSA 1987-1] New lighttpd packages fix denial of service | 2 Feb 201000:00 | β | securityvulns |
securityvulns | lighttpd DoS | 2 Feb 201000:00 | β | securityvulns |
Fedora | [SECURITY] Fedora 11 Update: lighttpd-1.4.26-2.fc11 | 12 May 201017:54 | β | fedora |
Fedora | [SECURITY] Fedora 12 Update: lighttpd-1.4.26-2.fc12 | 12 May 201018:02 | β | fedora |
Fedora | [SECURITY] Fedora 13 Update: lighttpd-1.4.26-2.fc13 | 12 May 201017:59 | β | fedora |
Tenable Nessus | GLSA-201006-17 : lighttpd: Denial of Service | 4 Jun 201000:00 | β | nessus |
Tenable Nessus | lighttpd < 1.4.26 or 1.5.0 Denial of Service | 6 Feb 201800:00 | β | nessus |
Tenable Nessus | Fedora 13 : lighttpd-1.4.26-2.fc13 (2010-7611) | 1 Jul 201000:00 | β | nessus |
Tenable Nessus | Fedora 11 : lighttpd-1.4.26-2.fc11 (2010-7636) | 1 Jul 201000:00 | β | nessus |
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
nessus | www.nessus.org/u |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2010-7643.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(47469);
script_version("1.11");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2010-0295");
script_xref(name:"FEDORA", value:"2010-7643");
script_name(english:"Fedora 12 : lighttpd-1.4.26-2.fc12 (2010-7643)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Update lighttpd to the latest version of the 1.4 branch, with the
spawn-fcgi program split out for the first time on EL. This fixes
CVE-2010-0295 and also includes a fix for upstream bug #2157 where SSL
stopped working with RHEL 5.4.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=561340"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2010-May/041307.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?fd6b3d88"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected lighttpd package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_cwe_id(399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:lighttpd");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:12");
script_set_attribute(attribute:"patch_publication_date", value:"2010/04/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^12([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 12.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC12", reference:"lighttpd-1.4.26-2.fc12")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "lighttpd");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo