lighttpd: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200812-04 / lighttpd
||December 02, 2008
||December 02, 2008: 01
All supported architectures
Multiple vulnerabilities in lighttpd may lead to information disclosure or
a Denial of Service.
lighttpd is a lightweight high-performance web server.
Multiple vulnerabilities have been reported in lighttpd:
Qhy reported a memory leak in the http_request_parse() function in
Gaetan Bisson reported that URIs are not decoded before applying
url.redirect and url.rewrite rules (CVE-2008-4359).
Anders1 reported that mod_userdir performs case-sensitive comparisons
on filename components in configuration options, which is insufficient
when case-insensitive filesystems are used (CVE-2008-4360).
A remote attacker could exploit these vulnerabilities to cause a Denial
of Service, to bypass intended access restrictions, to obtain sensitive
information, or to possibly modify data.
There is no known workaround at this time.
All lighttpd users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.20"