Linux Security
    Linux Security
    Linux Security

    Debian: New lighttpd packages fix denial of service

    Posted By
    It was discovered that lighttpd, a fast webserver with minimal memory footprint, was didn't correctly handle SSL errors. This could allow a remote attacker to disconnect all active SSL connections.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1540-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                               Steve Kemp
    April 07, 2008              
    - ------------------------------------------------------------------------
    Package        : lighttpd
    Vulnerability  : DOS
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2008-1531
    It was discovered that lighttpd, a fast webserver with minimal memory
    footprint, was didn't correctly handle SSL errors.  This could allow
    a remote attacker to disconnect all active SSL connections.
    For the stable distribution (etch), this problem has been fixed in version
    We recommend that you upgrade your lighttpd package.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    Source archives:
        Size/MD5 checksum:     1098 0d420a477511699665602b3c64b39179
        Size/MD5 checksum:   793309 3a64323b8482b0e8a6246dbfdb4c39dc
        Size/MD5 checksum:    37428 1f54c20fa199127e6db25176bcbe5902
    Architecture independent packages:
        Size/MD5 checksum:    99548 11dbb6f839e908c0d641249fb3d4fdc4
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:    64532 d799861c011b78a8238777f49c6fb92d
        Size/MD5 checksum:   318940 0e6314a5e9254d6500fb67555844d71b
        Size/MD5 checksum:    64964 bd1d1cd3aa8c601b9cfad9e48528cb75
        Size/MD5 checksum:    61294 55daca76be0d34892687511d3f4f1be9
        Size/MD5 checksum:    71764 74606f3ddea8f458c2ede8395bedb305
        Size/MD5 checksum:    59532 267cff02d1ecbfa394bba4128d475fc8
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:    60706 f8be0d85f9fbeb4c13812193f5d9fd97
        Size/MD5 checksum:    69852 e827323f52a4705c7181d183d4d91e28
        Size/MD5 checksum:    59104 310716e9e2e8c2f52bef3d6c604d6db0
        Size/MD5 checksum:   297296 dbfccf2a8da12c6ebe829322be356345
        Size/MD5 checksum:    63842 b0f28737f30018c175bf880134b3a125
        Size/MD5 checksum:    63542 64b3baf663b5da3ecb2768583aea88db
    arm architecture (ARM)
        Size/MD5 checksum:    58644 dca9be439e843773122daa5116961f47
        Size/MD5 checksum:    60770 834dbe952f348107cb9c67725a1f10a9
        Size/MD5 checksum:   286372 92f55d65c3270e7a7686e9dcc4238891
        Size/MD5 checksum:    63016 3d2e94666a3a202be5c5a827fbdcb1b7
        Size/MD5 checksum:    69550 05411ae38a2707a34bd39d2f6c5b4c21
        Size/MD5 checksum:    62810 ce3d76b2d95b11f5ec9786cef294529a
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:    64816 6acfc017952efd135f321647e25dde98
        Size/MD5 checksum:    59824 7992d416326a977de23342aded31794d
        Size/MD5 checksum:    65306 f962d71c01565f840e27e0ff7277f08f
        Size/MD5 checksum:   323966 2f988d0e8477a97e67646d1eab378bcb
        Size/MD5 checksum:    72226 132da0df987e1a455bbd5f22c1717b94
        Size/MD5 checksum:    61790 d621a174492d0242af13b95b6367e391
    i386 architecture (Intel ia32)
        Size/MD5 checksum:   289080 3b7e2220550ad5501a170bebd1c5a13b
        Size/MD5 checksum:    60808 7172f3019391d067f3b25bf66c1cadfa
        Size/MD5 checksum:    70886 d39938922e8d46b4131e96113f866151
        Size/MD5 checksum:    63842 ba0dbce4e4c723572693ecc99aaa72aa
        Size/MD5 checksum:    59044 cba49deeb94a51e8499e1f9c343df596
        Size/MD5 checksum:    63648 d51193103888bbd61d53318a06e72bcd
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:   403400 7e52b6af3071399751a6f441efb7ddff
        Size/MD5 checksum:    61138 0bdc32d95d978ea6b3a7ea5aad1adf0b
        Size/MD5 checksum:    67316 6c48f24b952c635a0493cc0f1bddf15c
        Size/MD5 checksum:    63012 4a6645b05cb285aaab3b32d1893759ff
        Size/MD5 checksum:    77006 aff32f03cafed1375aca3fb4d66e3e30
        Size/MD5 checksum:    67460 b320f16089ca496d8b539552979010e5
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:    59902 07ae05203cfa68d6fceb25203bd26849
        Size/MD5 checksum:    58522 b365869b231400d2f55d01f6a5b2a8d1
        Size/MD5 checksum:   296118 84123ee64559dac2333e5526e442f109
        Size/MD5 checksum:    62606 c2dbbd96a58f53c5a9b5fe80f65fd6b5
        Size/MD5 checksum:    62478 75986c1998f6ee3132b79fda58e347db
        Size/MD5 checksum:    69180 a9ef213bba1905adcdd4445e48083916
    powerpc architecture (PowerPC)
        Size/MD5 checksum:    62414 38e9d66e552fef8b56375532efe174b8
        Size/MD5 checksum:    71724 2ee5137240b63aba6dd3ad3a10a26c04
        Size/MD5 checksum:    65352 b44ee19a0de0b85d7eb9996da1684589
        Size/MD5 checksum:    65072 e9f88e799fa8ff7577e9ee0cd5f0116d
        Size/MD5 checksum:   323808 f171052f3104e1efd3499b1b8956461b
        Size/MD5 checksum:    60600 ee6750716fe8ed2e4cef726e5c5c582d
    s390 architecture (IBM S/390)
        Size/MD5 checksum:   307182 9ed8633e8cf58b9d83488a617b2fe4da
        Size/MD5 checksum:    59536 866eee4b685f9da849eca6179c7e3086
        Size/MD5 checksum:    71316 0bb7148f058512acc22d7ebc1f9b9ddd
        Size/MD5 checksum:    61034 567a055780f4090bc3f6f997574e4fa2
        Size/MD5 checksum:    64188 51d457cb51f6d192ac8662947f16a2db
        Size/MD5 checksum:    64584 d35c85a7dc2f1d6f52f8aaa3a3ebc1d9
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:    63366 5f90bf87da4e97e99f2bd1ed41e93215
        Size/MD5 checksum:    58824 93775bfe28fa9444f305e293a2affd2c
        Size/MD5 checksum:   284216 88bb423b58186ba48c07d378eef60831
        Size/MD5 checksum:    63378 779a1f21bfb254895a910051e3660a6e
        Size/MD5 checksum:    60462 a5db92742c05ed0caadb462391a04a4e
        Size/MD5 checksum:    69840 185b4976ce7b4d0c0bd70263d3df329e
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.