Updated lighttpd packages fix multiple security vulnerbilities
Publication date: 20 Nov 2013Modification date: 20 Nov 2013
Type: security
Affected Mageia releases : 2 , 3
CVE: CVE-2013-4508 , CVE-2013-4559 , CVE-2013-4560
Description
Updated lighttpd packages fix security vulnerabilities: lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network (CVE-2013-4508). In lighttpd before 1.4.34, if setuid() fails for any reason, for instance if an environment limits the number of processes a user can have and the target uid already is at the limit, lighttpd will run as root. A user who can run CGI scripts could clone() often; in this case a lighttpd restart would end up with lighttpd running as root, and the CGI scripts would run as root too (CVE-2013-4559). In lighttpd before 1.4.34, if "fam" is enabled and there are directories reachable from configured doc roots and aliases on which FAMMonitorDirectory fails, a remote client could trigger a DoS (CVE-2013-4560).
References
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt
- http://www.debian.org/security/2013/dsa-2795
- https://bugs.mageia.org/show_bug.cgi?id=11662
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4559
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4560
SRPMS
3/core
- lighttpd-1.4.32-3.6.mga3
2/core
- lighttpd-1.4.30-5.3.mga2