Vigil@nce: lighttpd, several vulnerabilities
October 2008 by Vigil@nce
Several vulnerabilities of lighttpd can be used by an attacker to
create a denial of service or to obtain information.
– Gravity: 2/4
– Consequences: data reading, denial of service of service
– Provenance: internet client
– Means of attack: no proof of concept, no attack
– Ability of attacker: expert (4/4)
– Confidence: confirmed by the editor (5/5)
– Diffusion of the vulnerable configuration: high (3/3)
– Number of vulnerabilities in this bulletin: 3
– Creation date: 07/10/2008
IMPACTED PRODUCTS
– Debian Linux
– Unix - plateform
DESCRIPTION
The lighttpd program is a web server. It has several
vulnerabilities.
A memory leak of http_request_parse() can lead to a denial of
service. [grav:2/4; CVE-2008-4298, lighttpd_sa_2008_07]
When url are rewritten, checks are inconsistents, which can be
used by an attacker to access to server resources. [grav:2/4;
BID-31599, CVE-2008-4359, lighttpd_sa_2008_05]
The mod_userdir module incorrectly handles the case of names on
filesytems which are case-insensitive. [grav:1/4; BID-31600,
CVE-2008-4360, lighttpd_sa_2008_06]
CHARACTERISTICS
– Identifiers: BID-31599, BID-31600, CVE-2008-4298, CVE-2008-4359,
CVE-2008-4360, DSA-1645-1, lighttpd_sa_2008_05,
lighttpd_sa_2008_06, lighttpd_sa_2008_07, VIGILANCE-VUL-8152
– Url: http://vigilance.aql.fr/vulnerability/8152