Debian Security Advisory

DSA-1362-2 lighttpd -- several vulnerabilities

Date Reported:
29 Aug 2007
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 434888.
In Mitre's CVE dictionary: CVE-2007-3946, CVE-2007-3947, CVE-2007-3949, CVE-2007-3950, CVE-2007-4727.
More information:

Several vulnerabilities were discovered in lighttpd, a fast webserver with minimal memory footprint, which could allow the execution of arbitrary code via the overflow of CGI variables when mod_fcgi was enabled. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-3946

    The use of mod_auth could leave to a denial of service attack crashing the webserver.

  • CVE-2007-3947

    The improper handling of repeated HTTP headers could cause a denial of service attack crashing the webserver.

  • CVE-2007-3949

    A bug in mod_access potentially allows remote users to bypass access restrictions via trailing slash characters.

  • CVE-2007-3950

    On 32-bit platforms users may be able to create denial of service attacks, crashing the webserver, via mod_webdav, mod_fastcgi, or mod_scgi.

For the stable distribution (etch), these problems have been fixed in version 1.4.13-4etch4.

For the unstable distribution (sid), these problems have been fixed in version 1.4.16-1.

We recommend that you upgrade your lighttpd package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Architecture-independent component:
alpha architecture (DEC Alpha)
amd64 architecture (AMD x86_64 (AMD64))
arm architecture (ARM)
hppa architecture (HP PA RISC)
i386 architecture (Intel ia32)
ia64 architecture (Intel ia64)
mips architecture (MIPS (Big Endian))
powerpc architecture (PowerPC)
sparc architecture (Sun SPARC/UltraSPARC)

MD5 checksums of the listed files are available in the original advisory.