Linux Security
    Linux Security
    Linux Security

    Debian: lighttpd fix denial of service DSA-1303-1

    Posted By
    Two problems were discovered with lighttpd, a fast webserver with minimal memory footprint, which could allow denial of service. The Common Vulnerabilities and Exposures project identifies problems. One is a remote attackers could cause denial of service by disconnecting partway through making a request.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1303-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                                 Steve Kemp
    June 10, 2007                 
    - --------------------------------------------------------------------------
    Package        : lighttpd 
    Vulnerability  : denial of service
    Problem-Type   : local & remote
    Debian-specific: no
    CVE ID         : CVE-2007-1870 CVE-2007-1869
    Debian Bug     : 422254 
    Two problems were discovered with lighttpd, a fast webserver with
    minimal memory footprint, which could allow denial of service.
    The Common Vulnerabilities and Exposures project identifies the
    following problems:
      Remote attackers could cause denial of service by disconnecting
      partway through making a request.
      A NULL pointer dereference could cause a crash when serving files
      with a mtime of 0.
    For the stable distribution (etch) these problems have been fixed in
    version 1.4.13-4etch1.
    For the unstable distribution (sid) these problems have been fixed in
    version 1.4.14-1.
    We recommend that you upgrade your lighttpd package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
      Source archives:
          Size/MD5 checksum:     1098 ef3730d86ea77e526e66127d934f03c6
          Size/MD5 checksum:    15173 411d82d078a5303943389fc3521e7fba
          Size/MD5 checksum:   793309 3a64323b8482b0e8a6246dbfdb4c39dc
      Architecture independent components:
          Size/MD5 checksum:    99474 8a94fa9556f1429528319f1a1fa568f1
      Alpha architecture:
          Size/MD5 checksum:   318162 283fd8d6c7c27f4bd61898247da07db9
          Size/MD5 checksum:    64510 d0944bbc86a22daa45999afd00676920
          Size/MD5 checksum:    64070 d685ea88c4b629bab5771d08621aa81c
          Size/MD5 checksum:    59074 aad74a6b17e86c8c68b63717b4448e22
          Size/MD5 checksum:    60828 c136287cae4f4cea113657ea6b01ce41
          Size/MD5 checksum:    71320 bc0aa14a9955e2f386fbb43c6061ff8b
      AMD64 architecture:
          Size/MD5 checksum:   296426 7cbf0ee2b5a3c27b3478ae096419beef
          Size/MD5 checksum:    63922 981c2f63505bd5394c639a1aa93fa25a
          Size/MD5 checksum:    63646 d4ec90dda80422e47115faf57396bb05
          Size/MD5 checksum:    59132 a6cc6145c017eae377b20887dae4618c
          Size/MD5 checksum:    60724 6a6af3f67680ea042ea5e8a6d2170139
          Size/MD5 checksum:    69976 739708ec1200c70a6cc4b468080b49ae
      ARM architecture:
          Size/MD5 checksum:   288014 1114e00e94dc60364fa9aaad59183836
          Size/MD5 checksum:    62602 9947d36ac758e7d7cd78064c147ddbe2
          Size/MD5 checksum:    62462 220505089fe300fcce338cc730b7cfb2
          Size/MD5 checksum:    58360 ca58297fd12f1b62af27a85fddcf47ad
          Size/MD5 checksum:    60284 dce6b3c544c0e3bd2f8c08a88cfcb6f2
          Size/MD5 checksum:    69420 a889e304aab96e8be3638ce6a16ca1c3
      HP Precision architecture:
          Size/MD5 checksum:   323150 e49e128dcd9d3d38d08aeaa1fae889cd
          Size/MD5 checksum:    64930 a3a60a655c7f06f38ddd71df3d1c2b48
          Size/MD5 checksum:    64418 9fad81697a0dac3aa1f64cf2ea4a93b2
          Size/MD5 checksum:    59432 29c07432b0d96cc11d4794a6f618c94e
          Size/MD5 checksum:    61198 70155f2b1dce10205822cf14639eedcf
          Size/MD5 checksum:    72464 d51a480afe5e07b0335332e7b24085bb
      Intel IA-32 architecture:
          Size/MD5 checksum:   288108 06270ce40db3249625b3123afe20f545
          Size/MD5 checksum:    63110 a01ca815790e6579c308eb364fbf0b9e
          Size/MD5 checksum:    62910 17903e4397ba40d9b1fafaae03aeba67
          Size/MD5 checksum:    58516 ffd4e5175a0771229aa9ec0ee462367c
          Size/MD5 checksum:    60178 a6e7d1e4431950bb1cb9c8ed02d8796e
          Size/MD5 checksum:    70212 797fbce72817ed3092d0756d4f0b7b16
      Intel IA-64 architecture:
          Size/MD5 checksum:   402620 ee76492e203b1c42459a9d35708c15d1
          Size/MD5 checksum:    66974 14dfec6e97a3fffe45c8c8d2b1c263c7
          Size/MD5 checksum:    66822 c8761bdad0192b709a6650935a73b77e
          Size/MD5 checksum:    60666 a51f5988e23c3cb01ba872556e666c67
          Size/MD5 checksum:    62532 306c5d1b0744c9a55bdbc5a3e6ab9d43
          Size/MD5 checksum:    76526 1d46f971460f6bc919cbe4ae68f7049e
      Big endian MIPS architecture:
          Size/MD5 checksum:   295572 d4eff501f522141341fd0d42a7643e50
          Size/MD5 checksum:    62994 a42afe38e858bdc97e3d1cc2609040cd
          Size/MD5 checksum:    62832 21d9359dee2346189cb50bf6ce743fc5
          Size/MD5 checksum:    58804 1f3c6acfdd1500b1a44384cf013368e1
          Size/MD5 checksum:    60240 f06fa483be4d888fe6161d4343232879
          Size/MD5 checksum:    69504 53b09dd48fdcb378b8ebfb1ba4d71703
      Little endian MIPS architecture:
          Size/MD5 checksum:   296010 71a9419f817392755394718a35f176c0
          Size/MD5 checksum:    63028 d66cf97cf28ee0657b17f5357333b063
          Size/MD5 checksum:    62854 7861b0cd64b100a068bfebd841d12488
          Size/MD5 checksum:    58776 2af4301d158b3143d3b40e4aab618f74
          Size/MD5 checksum:    60248 839ad9fbbc65f5d873033599a5933b8e
          Size/MD5 checksum:    69494 c76e5480bafdcfcc6ae021aa1000c8b2
      PowerPC architecture:
          Size/MD5 checksum:   322174 74b0047df6db5edb00d9d2691c8f064c
          Size/MD5 checksum:    64874 17f172304062df3885814aa40abfaf19
          Size/MD5 checksum:    64516 542119472a68eae891b70b408425e5c1
          Size/MD5 checksum:    60134 7404bfe78362b08fa558310c38809521
          Size/MD5 checksum:    61946 caed2baa31f06fc1e7d96007c6d33b98
          Size/MD5 checksum:    71244 31d0392efa451d605daa53846388a9fb
      IBM S/390 architecture:
          Size/MD5 checksum:   306018 a2a8aaf5a00d7ffdc4a90be4c891e68a
          Size/MD5 checksum:    64108 b698d116eccc8373cd0d35efd704b8d5
          Size/MD5 checksum:    63718 cfa9c3c452641911f3dc47aa014f717d
          Size/MD5 checksum:    59080 d5edfcdfae8a88781869dc800317895b
          Size/MD5 checksum:    60572 66ffe78d259ed3c27ee59e9e62c162d1
          Size/MD5 checksum:    70756 bc6cb87a363b8007bee03d1383f4c7af
      Sun Sparc architecture:
          Size/MD5 checksum:   283110 f6e58d1dc5993bad86eeac3d322c4f96
          Size/MD5 checksum:    62912 61868c7b6990c7c358643edb63bb9d2f
          Size/MD5 checksum:    62884 983eee1671580a04506e6353a119c1ab
          Size/MD5 checksum:    58356 f5a3f3eb5caaac0966e64a463eb8635c
          Size/MD5 checksum:    60002 39e417cc65309ed2aeee7f7c91a607cb
          Size/MD5 checksum:    69364 dc30f534d4bb72a97b62f3c4f59fdaf6
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"131","title":"Preventing information leakage","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.