lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 29 Aug 2007 22:21:11 +0100
From: Steve Kemp <>
Subject: [SECURITY] [DSA 1362-1] New lighttpd packages fix several vulnerabilities

Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1362                                         Steve Kemp
August 29th, 2007           
- ------------------------------------------------------------------------

Package        : lighttpd
Vulnerability  : various
Problem type   : local/remote
Debian-specific: no
CVE Id(s)      : CVE-2007-3946
Debian Bug     : 434888

Several vulnerabilities were discovered in lighttpd, a fast webserver with
minimal memory footprint.  The Common Vulnerabilities and Exposures project
identifies the following problems:


    The use of mod_auth could leave to a denial of service attack crashing
    the webserver


    The improper handling of repeated HTTP headers could cause a denial
    of serve attack crashing the webserver.


    A bug in mod_access potentially allows remote users to bypass
    access restrictions via trailing slash characters.


    On 32-bit platforms users may be able to create denial of service
    attacks, crashing the webserver, via mod_webdav, mod_fastcgi, or

For the stable distribution (etch), these problems have been fixed in version

For the unstable distribution (sid), these problems have been fixed in
version 1.4.16-1.

We recommend that you upgrade your lighttpd package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:
    Size/MD5 checksum:   793309 3a64323b8482b0e8a6246dbfdb4c39dc
    Size/MD5 checksum:     1098 e759ee83cf22697f62b11df286973b7a
    Size/MD5 checksum:    33811 259574ed674f31dd8c44dc46809656bb

Architecture independent packages:
    Size/MD5 checksum:    99376 c4ea0d3adca48f1c749b4c3e49293bba

alpha architecture (DEC Alpha)
    Size/MD5 checksum:    71460 8b25398ab656e85d82ef611d7110191c
    Size/MD5 checksum:    64650 d023bc4775d81b0f0be9d56043d2d893
    Size/MD5 checksum:   318496 54eb4b6bdfcf41c72f5d3b2f8f91778d
    Size/MD5 checksum:    59244 6098a74659117029c062132179e88a96
    Size/MD5 checksum:    60996 2c30d7179beeea97d1e868d34cc314c5
    Size/MD5 checksum:    64226 36bdb8c2ecbe874aaec676cd7c3992c9

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:    60664 8b1e4185d6961a8dd6823c90b698d1a0
    Size/MD5 checksum:    63542 420d82c389da7a774118495eca87ae76
    Size/MD5 checksum:    58986 17e377ca088aaa2f5fcb84902eaa75da
    Size/MD5 checksum:    63870 02499705ef7a069be4df2fff55fbfd97
    Size/MD5 checksum:   297416 9931993931036ec2252d39cade28bc09
    Size/MD5 checksum:    70150 3665d99b3aa0153ad51168a392e3dbfd

arm architecture (ARM)
    Size/MD5 checksum:    62766 dfa6a35455776fd429420bdac95f3d6a
    Size/MD5 checksum:    62624 87ad57adafd7dac22bace1b3f78c3a8d
    Size/MD5 checksum:    58522 e919dd7724d7ed3cbf69c06a07cda5c6
    Size/MD5 checksum:    60450 d97c010d5a7a732d7b72b0999b1d2981
    Size/MD5 checksum:    69582 6a73b105d5640f06676ed67f4f377702
    Size/MD5 checksum:   288496 7d4e2ad91b8b4d5e7508112a2702e7a2

hppa architecture (HP PA RISC)
    Size/MD5 checksum:    72640 20e2a23db84c6087d2ceadf132237307
    Size/MD5 checksum:    59588 b2cf574224dc849bfe7c1ad9e4934c55
    Size/MD5 checksum:    65116 cb79c0db6b1d90fe0b5414707a982870
    Size/MD5 checksum:   323700 58b6d9a3e9f959109cebe9bd2568d084
    Size/MD5 checksum:    61438 5670fd8056e890cfcee290d9905c1c6a
    Size/MD5 checksum:    64662 e64d288444457ad1b39d6a6bf0744987

i386 architecture (Intel ia32)
    Size/MD5 checksum:    60440 e3423b0c025ba70a649f93afb67c1cff
    Size/MD5 checksum:   286996 802f3844967326a42ab410578f1a2828
    Size/MD5 checksum:    58648 af9b965e45f78ad92c8c77ca05e28e61
    Size/MD5 checksum:    70006 2195971aa95082d9a67a0ade17bb16b0
    Size/MD5 checksum:    63114 f5796a135101dcc9c7f17ff4a2acfa54
    Size/MD5 checksum:    63354 c5f753b53e66c8d07130625835378379

ia64 architecture (Intel ia64)
    Size/MD5 checksum:    60830 28f35d9770d96cbc7c3b08790ae363fc
    Size/MD5 checksum:    66988 fc243d57a0019a596e4005e11f74c8d0
    Size/MD5 checksum:    67148 60a0c56991502c957200179f6b1a5b80
    Size/MD5 checksum:   403080 414aa7e0a26ef46678d49e6a818f2c5f
    Size/MD5 checksum:    62702 1c554d315d8f1a2fd06ceffb8bdf4a09
    Size/MD5 checksum:    76696 1e0d1beac8bb36bf5c82da00271748d3

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:    58958 3535829d49a0a3cf1675b430a7f86e61
    Size/MD5 checksum:    63148 0811ae02e2b242dd8b6daa11f49ab357
    Size/MD5 checksum:    63000 5f82b35e39c23618d616432c4fdf3d55
    Size/MD5 checksum:    69676 4e46069f91751eaf40526eed244049af
    Size/MD5 checksum:    60398 de38e5c12a8f2d5aab03d6dcb6c68fd4
    Size/MD5 checksum:   296092 5cebdb3b6f4f300503dceec97ff5fdb1

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:    69648 ffa762a3a4041eee374b9735b00102f7
    Size/MD5 checksum:    60404 231b375e6591fbff5237fcfc560da580
    Size/MD5 checksum:    63012 335f6be5702df10dd0832a7a513142e8
    Size/MD5 checksum:    58930 09525411ab17b991b1b5da3ce0ef2271
    Size/MD5 checksum:   296470 9e5d70e2dd6f5ad4fecdf25cc9e2be75
    Size/MD5 checksum:    63188 5d8c22a4a7f7f5f2e992f738fff56fc7

powerpc architecture (PowerPC)
    Size/MD5 checksum:    60302 aa2ae5c7d472398201af510b2b98e8b7
    Size/MD5 checksum:    62116 802c522b2b36c25beb043f1aab7f378c
    Size/MD5 checksum:    71404 bdbd879e21dd5dfad5123f15b98c85f7
    Size/MD5 checksum:    64766 b53358fbebbfc721580ab21f4f568d53
    Size/MD5 checksum:   323284 04c290e9fcb6480cc6c6ae0c1d73db3d
    Size/MD5 checksum:    65046 d528c07e0631710b11549a91257ddbd4

s390 architecture (IBM S/390)
    Size/MD5 checksum:    71002 17d6443af1d09e6d92d8e834110c8973
    Size/MD5 checksum:    64282 b398dfadbb6fb510ad625e7dadfa61e3
    Size/MD5 checksum:    59232 2917d6a60f6284120b1c48de4f2b9b9d
    Size/MD5 checksum:   306470 fe239b45d2201aeda34ad0395c881b74
    Size/MD5 checksum:    60734 0be7bc114adaa57a0d533979cbb94455
    Size/MD5 checksum:    63892 fdba3d63a19576948649939500d6df3c

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:    60178 f9742d8dbcd105ebe444c90debbc53c0
    Size/MD5 checksum:    63058 90f636b132db3d505661cf1a21440e7b
    Size/MD5 checksum:    69528 8c2e7bfb821352516818b338ede170bd
    Size/MD5 checksum:    58524 c8c1a41cffbe1a0cf898c0540488f066
    Size/MD5 checksum:    63084 8bb0811dd25d02eec370038f565b9318
    Size/MD5 checksum:   283548 b3c07e7896284eee5e945bf3356f0144

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>
Version: GnuPG v1.4.6 (GNU/Linux)


Powered by blists - more mailing lists