Mandriva Linux Security Advisory : lighttpd (MDVSA-2013:277)

high Nessus Plugin ID 71031

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated lighttpd packages fix security vulnerabilities :

lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network (CVE-2013-4508).

In lighttpd before 1.4.34, if setuid() fails for any reason, for instance if an environment limits the number of processes a user can have and the target uid already is at the limit, lighttpd will run as root. A user who can run CGI scripts could clone() often; in this case a lighttpd restart would end up with lighttpd running as root, and the CGI scripts would run as root too (CVE-2013-4559).

In lighttpd before 1.4.34, if fam is enabled and there are directories reachable from configured doc roots and aliases on which FAMMonitorDirectory fails, a remote client could trigger a DoS (CVE-2013-4560).

Solution

Update the affected packages.

See Also

http://advisories.mageia.org/MGASA-2013-0334.html

Plugin Details

Severity: High

ID: 71031

File Name: mandriva_MDVSA-2013-277.nasl

Version: 1.6

Type: local

Published: 11/22/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lighttpd, p-cpe:/a:mandriva:linux:lighttpd-mod_auth, p-cpe:/a:mandriva:linux:lighttpd-mod_cml, p-cpe:/a:mandriva:linux:lighttpd-mod_compress, p-cpe:/a:mandriva:linux:lighttpd-mod_magnet, p-cpe:/a:mandriva:linux:lighttpd-mod_mysql_vhost, p-cpe:/a:mandriva:linux:lighttpd-mod_trigger_b4_dl, p-cpe:/a:mandriva:linux:lighttpd-mod_webdav, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/21/2013

Reference Information

CVE: CVE-2013-4508, CVE-2013-4559, CVE-2013-4560

BID: 63534, 63686, 63688

MDVSA: 2013:277