[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20130315213335.65249FA6@scapa.corsac.net>
Date: Fri, 15 Mar 2013 22:33:30 +0100 (CET)
From: Yves-Alexis Perez <corsac@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2649-1] lighttpd security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2649-1 security@...ian.org
http://www.debian.org/security/ Yves-Alexis Perez
March 15, 2013 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : lighttpd
Vulnerability : fixed socket name in world-writable directory
Problem type : local
Debian-specific: yes
CVE ID : CVE-2013-1427
Debian Bug :
Stefan Bühler discovered that the Debian specific configuration file for
lighttpd webserver FastCGI PHP support used a fixed socket name in the
world-writable /tmp directory. A symlink attack or a race condition could be
exploited by a malicious user on the same machine to take over the PHP control
socket and for example force the webserver to use a different PHP version.
As the fix is in a configuration file lying in /etc, the update won't be
enforced if the file has been modified by the administrator. In that case, care
should be taken to manually apply the fix.
For the stable distribution (squeeze), this problem has been fixed in
version 1.4.28-2+squeeze1.3.
For the testing distribution (wheezy), this problem has been fixed in
version 1.4.31-4.
For the unstable distribution (sid), this problem has been fixed in
version 1.4.31-4.
We recommend that you upgrade your lighttpd packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
iQEcBAEBCgAGBQJRQ5OpAAoJEG3bU/KmdcClChwH+gIPrukTLA2IOjdgXBPiRhS6
46rJ1yGtoSMscVeJ9ILgT5wWjj+wFiYf5cfgWUUqjfCq3TcOEXtioul3rCShq4ht
zS+tp8CqltN80ZjXNzLV9X8ijvJ8tZyVRGFe+uroQSM3CUELU3Ykkeu7hr5EgQPE
B8PvrOhrvnPcPUZG4m9Dh92BDfbzv2CRWY51KH6t1/ZZNUHTH208hwENpsOeut3X
EbOGJzXgxWyWJCylnAc4Cp8WwCx36hhAU54msMyQxKu2NscGq8a4fmD3/uG98UjT
dDD/UlcDGh35OT/+plP5QWnG7ZLCUfTJlAG352DiaV9zegVBJE3f74nbAuKLJI8=
=CgMg
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists