Debians sikkerhedsbulletin
DSA-396-1 thttpd -- manglende validering af inddata, forkert beregning
- Rapporteret den:
- 29. okt 2003
- Berørte pakker:
- thttpd
- Sårbar:
- Ja
- Referencer i sikkerhedsdatabaser:
- I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 8906, BugTraq-id 8924.
I Mitres CVE-ordbog: CVE-2002-1562, CVE-2003-0899. - Yderligere oplysninger:
-
Der er opdaget flere sårbarheder i thttpd, en lille HTTP-server.
Projektet Common Vulnerabilities and Exposures har fundet frem til følgende sårbarheder:
- CAN-2002-1562: Informationslækage
Marcus Breiing har opdaget, at hvis thttpd anvendes til virtuel hosting og en angriber anvender en særligt fremstillet "Host:"-headerlinie med et stinavn i stedet for et værtsnavn, så afslører thttpd oplysninger om værtssystemet og angriberen kan dermed gennemse hele disken.
- CAN-2003-0899: Udførelse af vilkårlig kode
Joel Söderberg og Christer Öberg har opdaget et bufferoverløb, der gør det muligt for en fjernangriber delvist at overskrive EBP-registeret og dermed udføre vilkårlig kode.
I den stabile distribution (woody) er disse problemer rettet i version 2.21b-11.2.
I den ustabile distribution (sid) er disse problemer rettet i version 2.23beta1-2.3.
Vi anbefaler at du omgående opgraderer din thttpd-pakke.
- CAN-2002-1562: Informationslækage
- Rettet i:
-
Debian GNU/Linux 3.0 (woody)
- Kildekode:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2.dsc
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2.diff.gz
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_alpha.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_alpha.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_arm.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_arm.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_i386.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_i386.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_ia64.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_ia64.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_hppa.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_hppa.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_m68k.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_m68k.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_mips.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_mips.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_mipsel.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_mipsel.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_powerpc.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_powerpc.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_s390.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_s390.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.21b-11.2_sparc.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_sparc.deb
- http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.21b-11.2_sparc.deb
MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.