MGASA-2013-0334

Source
https://advisories.mageia.org/MGASA-2013-0334.html
Import Source
https://advisories.mageia.org/MGASA-2013-0334.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0334
Related
Published
2013-11-20T20:36:53Z
Modified
2013-11-20T20:36:26Z
Summary
Updated lighttpd packages fix multiple security vulnerbilities
Details

Updated lighttpd packages fix security vulnerabilities:

lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network (CVE-2013-4508).

In lighttpd before 1.4.34, if setuid() fails for any reason, for instance if an environment limits the number of processes a user can have and the target uid already is at the limit, lighttpd will run as root. A user who can run CGI scripts could clone() often; in this case a lighttpd restart would end up with lighttpd running as root, and the CGI scripts would run as root too (CVE-2013-4559).

In lighttpd before 1.4.34, if "fam" is enabled and there are directories reachable from configured doc roots and aliases on which FAMMonitorDirectory fails, a remote client could trigger a DoS (CVE-2013-4560).

References
Credits

Affected packages

Mageia:3 / lighttpd

Package

Name
lighttpd
Purl
pkg:rpm/mageia/lighttpd?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.32-3.6.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:2 / lighttpd

Package

Name
lighttpd
Purl
pkg:rpm/mageia/lighttpd?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.30-5.3.mga2

Ecosystem specific

{
    "section": "core"
}