[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061103154156.GA27253@steve.org.uk>
Date: Fri, 3 Nov 2006 15:41:56 +0000
From: Steve Kemp <skx@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA-1205-1] New thttpd packages fix
insecure temporary file creation
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1205-1 security@...ian.org
http://www.debian.org/security/ Steve Kemp
November 2rd, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : thttpd
Vulnerability : insecure temporary files
Problem-Type : local
Debian-specific: yes
CVE ID : CVE-2006-4248
Debian Bug : 396277
Marco d'Itri discovered that thttpd, a small, fast and secure webserver,
makes use of insecure temporary files when its logfiles are rotated,
which might lead to a denial of service through a symlink attack.
For the stable distribution (sarge) this problem has been fixed in
version 2.23beta1-3sarge2
For the unstable distribution (sid) this problem has been fixed in
version 2.23beta1-5
We recommend that you upgrade your thttpd package.
Upgrade Instructions
- - --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- - --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.dsc
Size/MD5 checksum: 614 0f9a3730f341fa0151596a3b9f20764d
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.diff.gz
Size/MD5 checksum: 14313 8545dd3d0f7a2083ecca36e53e72bd6b
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1.orig.tar.gz
Size/MD5 checksum: 128712 d3d91f6596f53d5e2b27cea8607d5bba
Alpha architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_alpha.deb
Size/MD5 checksum: 59240 f6854853b290fe2ce1a925cbbea3856a
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_alpha.deb
Size/MD5 checksum: 27978 6b4680363644b459e0e47222985f749f
AMD64 architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_amd64.deb
Size/MD5 checksum: 56034 9848065d7700f2f6e0a036ee76e8fcf7
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_amd64.deb
Size/MD5 checksum: 26456 befb78e032aa654e5fcfcc7c9fdff21b
ARM architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_arm.deb
Size/MD5 checksum: 53198 6a9c1e8afaa60a7b4b7787729dd97b9b
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_arm.deb
Size/MD5 checksum: 24610 f35f8b0a749694fea536296d2a41e1f0
HP Precision architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_hppa.deb
Size/MD5 checksum: 57374 4755b42efc9a48b59b1e745862e01098
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_hppa.deb
Size/MD5 checksum: 26912 557472d5a3e182b86999baa0b89846ba
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_i386.deb
Size/MD5 checksum: 51180 991b1072ebd903b6a9ee316b1bfdc8c6
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_i386.deb
Size/MD5 checksum: 24776 fd3dddb60d160a6245da4c7efd5dcfe4
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_ia64.deb
Size/MD5 checksum: 71954 924db7bf3beb5ce3c0e5018759aef3d6
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_ia64.deb
Size/MD5 checksum: 30276 530abc02e3c392a91bff06fe1d8ce7af
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_m68k.deb
Size/MD5 checksum: 50132 bcb24b62afb868c5e04b8c1db66e6cc3
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_m68k.deb
Size/MD5 checksum: 24756 4b30d87639b3d6b7ca58537cf16c6953
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_mips.deb
Size/MD5 checksum: 57044 410e480e061a3876b7ff01beaffb571e
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_mips.deb
Size/MD5 checksum: 30980 2cda342ba6a04fdbe0a938359eeff813
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_mipsel.deb
Size/MD5 checksum: 57112 fe0268048af2940619a9380d7cd83626
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_mipsel.deb
Size/MD5 checksum: 31126 64e73613ca88afa3fd379b657c80a414
PowerPC architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_powerpc.deb
Size/MD5 checksum: 53442 58c39568158a4c3da81efcaf6a0ab838
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_powerpc.deb
Size/MD5 checksum: 25160 a5ff28da9df6080438012db8014b0212
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_s390.deb
Size/MD5 checksum: 56214 f39998665c2df9236d2902120eb977f9
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_s390.deb
Size/MD5 checksum: 26268 34e822b698803e3e0139430aea707f55
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_sparc.deb
Size/MD5 checksum: 53298 a8dcaf92cb41b607618b4a271927c250
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_sparc.deb
Size/MD5 checksum: 24718 54c4e9dac68c9b8472dc92fe6966f6e4
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFFS2LgwM/Gs81MDZ0RAnTSAKDXWzYWgkLAGInrnLQHIZUmQGKUPQCgh57J
Aq8fa0owdwsZOniP0bvjwaI=
=oJgN
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists