Linux Security
Linux Security
Linux Security

Debian: New lighttpd packages fix CGI source disclosure

Date 06 Mar 2008
Posted By LinuxSecurity Advisories
It was discovered that lighttpd, a fast webserver with minimal memory footprint, would display the source to CGI scripts if their execution failed in some circumstances.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1513-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                               Steve Kemp
March 06, 2008              
- ------------------------------------------------------------------------

Package        : lighttpd
Vulnerability  : information disclosure
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-1111

It was discovered that lighttpd, a fast webserver with minimal memory
footprint, would display the source to CGI scripts if their execution
failed in some circumstances.

For the stable distribution (etch), this problem has been fixed in version

For the unstable distribution, this problem will be fixed soon.

We recommend that you upgrade your lighttpd package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:
    Size/MD5 checksum:    36835 fa55bbf4bf1b9a555cc4b7b368a059f6
    Size/MD5 checksum:   793309 3a64323b8482b0e8a6246dbfdb4c39dc
    Size/MD5 checksum:     1098 52f5881ec943188d8276c600902c84f5

Architecture independent packages:
    Size/MD5 checksum:    99430 b13f37c0c8b55e145e6f823d5dd82dee

alpha architecture (DEC Alpha)
    Size/MD5 checksum:    71646 3d0308407b0b089bb8d8a215503f20d8
    Size/MD5 checksum:    59412 cf3dc4218076b66d5fb04e40cb6e6a03
    Size/MD5 checksum:    64832 c58a1cfc4a506351ef2425f4e4018113
    Size/MD5 checksum:    61170 0a2a5196ed776076f29fb8a85976387e
    Size/MD5 checksum:    64402 58268f6c0dc00b8e0fe16f5cf93a6d86
    Size/MD5 checksum:   318776 55890a8afec6ff4fba50ff2e8ac4df6c

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:    69738 92677861a76629b9a3361c2c338d5bb0
    Size/MD5 checksum:    63434 98b26e827bb4c8a023239a90bfdb45a2
    Size/MD5 checksum:    60586 a3c573b8d1f921fb93fd28e33ee86d4f
    Size/MD5 checksum:    58994 de8951a3316888b5874f3b3ee0abe755
    Size/MD5 checksum:    63726 0ca9bf4df2ca8260495146011e6d3a53
    Size/MD5 checksum:   297048 a12c33257671acdd291f41b7b7f8c64d

arm architecture (ARM)
    Size/MD5 checksum:   286092 3821f3f07c614ccf1a98cdec79301a18
    Size/MD5 checksum:    58528 1e3e7f75c172bb082c7b083110194c9f
    Size/MD5 checksum:    60664 489518ec1610f510562a1d0a2dfcb940
    Size/MD5 checksum:    69414 41096405646828e7a63a6e4b208d5497
    Size/MD5 checksum:    62916 e74d042125f02400c48f2763d34e6d9a
    Size/MD5 checksum:    62718 3d19c37366365f0e7f3ee06da00df623

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   324114 f8cc861ec3e948179387ee31f6f9f3b4
    Size/MD5 checksum:    61616 fe5f56af17823da3ef58b9a0b8e6d298
    Size/MD5 checksum:    72826 517acc9044c0d82adea99c3d1ca1f0cc
    Size/MD5 checksum:    64824 81bd6d5482ce8a3c5179edeecfd08346
    Size/MD5 checksum:    59764 5d3f99e779ef096348b6749e4c809ba4
    Size/MD5 checksum:    65288 bdd83e24259d7f2922c3a95b8293b36c

i386 architecture (Intel ia32)
    Size/MD5 checksum:    58916 caed74881673974288bbc290b3ba3479
    Size/MD5 checksum:    63722 5363ca45b9753e937fa011b163e2f376
    Size/MD5 checksum:    63530 dda93744e3b76dd8f9e4a3dba20ca07a
    Size/MD5 checksum:    60684 fb1d5f0bcbabae22f148425b4c42fae5
    Size/MD5 checksum:    70772 73b0ecdcafb617bf8e2e442f1886d9b0
    Size/MD5 checksum:   288902 30283b07cea3f0a26dc1a38b839f2807

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   403296 6c366b8fed9ff23f19aaf50a66931a69
    Size/MD5 checksum:    62884 0ccb5f79ae50fbc9967b7af053ff0e76
    Size/MD5 checksum:    61006 84f8efd4a34a05253e02aae4ad9e666a
    Size/MD5 checksum:    67184 3bd3cb49438d49c70436d106f97de40d
    Size/MD5 checksum:    76888 b5d4d899efb03134815b04b570bb8174
    Size/MD5 checksum:    67326 c3301e3405ea81adbcbfdb25e9175df6

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:   295944 7f5edffb4a6fa10cf0d57353d04939bc
    Size/MD5 checksum:    58380 8f124d373348b24428af69b411966c31
    Size/MD5 checksum:    59762 63dbb566d233a7ca46f646e6f31db643
    Size/MD5 checksum:    69048 a3002e94627fbe13a92f3750767ff833
    Size/MD5 checksum:    62456 4b933ff37574e18d94b518d2dd1ddce1
    Size/MD5 checksum:    62340 c62744ec6d7a84e13cda39089fc2cc40

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:    69848 b01bc2ff253e183ccf000765acb86f81
    Size/MD5 checksum:    60592 5aa70a480157629fc6caa35309371236
    Size/MD5 checksum:    63194 a7d0666adf203cfc8a3089b7b27e7d27
    Size/MD5 checksum:    59104 1d57b007782bbb3116113b418aa4d7c7
    Size/MD5 checksum:   297028 96a183bd09c3ecee7899fa322a3d249f
    Size/MD5 checksum:    63370 b1f2124c09cfce63f77814bdfaf89ec6

powerpc architecture (PowerPC)
    Size/MD5 checksum:    65218 22aa056a61b992c613453c4e42a18931
    Size/MD5 checksum:    64942 0a52051cdf863e7f4d07a784e9b999a6
    Size/MD5 checksum:    71590 497c515d7d21d17b47938bb3ca62c98a
    Size/MD5 checksum:   323626 5d902bf2d0dad086610eed1a3ef399ff
    Size/MD5 checksum:    62298 5a6077d928a46f5412041586a79979a9
    Size/MD5 checksum:    60480 e6b803329d925e756ebae8f3b8a25f61

s390 architecture (IBM S/390)
    Size/MD5 checksum:    64456 652df202c4877e31a189fdab5d73c429
    Size/MD5 checksum:    71184 6a27ce3f4965c2f45063fc6a12fc95a1
    Size/MD5 checksum:    64062 a1916058ca6929ba5ede58cd6df1c9fd
    Size/MD5 checksum:    59412 34187112fc60034864b8d7e4ad058010
    Size/MD5 checksum:    60908 f457bf75d0034e57a2b037e091f1e8bc
    Size/MD5 checksum:   307020 9eaba4e65073194a68936c9957051597

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:    63234 c488f5fd992c2e1bc594614259a81c6d
    Size/MD5 checksum:    60348 643d00ff129a367c2f3f944ec3e9085d
    Size/MD5 checksum:    58700 32e6ed5c3bec41941466a4929d1e25ab
    Size/MD5 checksum:   283968 973579db2fff4ba527bbcfb8a78b4fb5
    Size/MD5 checksum:    69712 a5b419803f4c7fb418291327c45ce442
    Size/MD5 checksum:    63262 1748dc5be4967ff3fab5b94863e2be74

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.