Issue Overview:
It was discovered that lighttpd class did not properly protect against the HTTP_PROXY variable name clash in a CGI context. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
Affected Packages:
lighttpd
Issue Correction:
Run yum update lighttpd to update your system.
New Packages:
i686:
lighttpd-debuginfo-1.4.41-1.34.amzn1.i686
lighttpd-1.4.41-1.34.amzn1.i686
lighttpd-mod_geoip-1.4.41-1.34.amzn1.i686
lighttpd-mod_mysql_vhost-1.4.41-1.34.amzn1.i686
lighttpd-fastcgi-1.4.41-1.34.amzn1.i686
src:
lighttpd-1.4.41-1.34.amzn1.src
x86_64:
lighttpd-mod_mysql_vhost-1.4.41-1.34.amzn1.x86_64
lighttpd-mod_geoip-1.4.41-1.34.amzn1.x86_64
lighttpd-1.4.41-1.34.amzn1.x86_64
lighttpd-fastcgi-1.4.41-1.34.amzn1.x86_64
lighttpd-debuginfo-1.4.41-1.34.amzn1.x86_64
Red Hat: CVE-2016-1000212
Mitre: CVE-2016-1000212