Skip site navigation (1)Skip section navigation (2)
Date:      Sat,  6 Dec 2008 23:41:18 +0300 (MSK)
From:      Eygene Ryabinkin <rea-fbsd@codelabs.ru>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/129472: [vuxml] www/lighttpd: document CVE-2008-{4298, 4359, 4360}
Message-ID:  <20081206204118.3C7B7B8019@phoenix.codelabs.ru>
Resent-Message-ID: <200812062050.mB6Ko5NF085994@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         129472
>Category:       ports
>Synopsis:       [vuxml] www/lighttpd: document CVE-2008-{4298,4359,4360}
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sat Dec 06 20:50:03 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator:     Eygene Ryabinkin
>Release:        FreeBSD 7.1-PRERELEASE amd64
>Organization:
Code Labs
>Environment:

System: FreeBSD 7.1-PRERELEASE amd64

>Description:

Multiple issues were fixed in lighttpd 1.4.20:
  http://www.lighttpd.net/security/lighttpd_sa_2008_07.txt
  http://www.lighttpd.net/security/lighttpd_sa_2008_05.txt
  http://www.lighttpd.net/security/lighttpd_sa_2008_06.txt
Port was updated in October 2008 (ports/127861), but VuXML entry
was not created.

>How-To-Repeat:

Look at the above URLs.

>Fix:

The following VuXML entry should be evaluated and added:
--- vuln.xml begins here ---
  <vuln vid="594d0c5c-c3d4-11dd-b08d-001fc66e7203">
    <topic>lighttpd -- multiple vulnerabilities</topic>
    <affects>
      <package>
        <name>lighttpd</name>
        <range><lt>1.4.20</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">;
        <p>Multiple issues were fixed in lighttpd 1.4.20:</p>
        <blockquote
          cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4298">;
          <p>Memory leak in the http_request_parse function in request.c
          in lighttpd before 1.4.20 allows remote attackers to cause a
          denial of service (memory consumption) via a large number of
          requests with duplicate request headers.</p>
        </blockquote>
        <blockquote
          cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4359">;
          <p>lighttpd before 1.4.20 compares URIs to patterns in the (1)
          url.redirect and (2) url.rewrite configuration settings before
          performing URL decoding, which might allow remote attackers to
          bypass intended access restrictions, and obtain sensitive
          information or possibly modify data.</p>
        </blockquote>
        <blockquote
          cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360">;
          <p>mod_userdir in lighttpd before 1.4.20, when a
          case-insensitive operating system or filesystem is used,
          performs case-sensitive comparisons on filename components in
          configuration options, which might allow remote attackers to
          bypass intended access restrictions, as demonstrated by a
          request for a .PHP file when there is a configuration rule for
          .php files.</p>
        </blockquote>
      </body>
    </description>
    <references>
      <cvename>CVE-2008-4298</cvename>
      <cvename>CVE-2008-4359</cvename>
      <cvename>CVE-2008-4360</cvename>
      <url>http://www.lighttpd.net/security/lighttpd_sa_2008_07.txt</url>;
      <url>http://www.lighttpd.net/security/lighttpd_sa_2008_05.txt</url>;
      <url>http://www.lighttpd.net/security/lighttpd_sa_2008_06.txt</url>;
    </references>
    <dates>
      <discovery>02-12-2008</discovery>
      <entry>TODAY</entry>
    </dates>
  </vuln>
--- vuln.xml ends here ---
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20081206204118.3C7B7B8019>