An signedness error, leading to out of stack-based buffer read flaw was found in the way lighttpd, a lightning fast webserver with light system requirements, processed certain invalid base64 HTTP authentication tokens. A remote attacker could provide a specially crafted HTTP authentication request, leading to denial of service (lighttpd daemon crash due to an signedness error while processing the token). Upstream bug report: [1] http://redmine.lighttpd.net/issues/2370 Upstream patch (with testcase and NEWS update): [2] http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2806/diff References: [3] http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2011_01.txt (upstream advisory) [4] http://www.openwall.com/lists/oss-security/2011/11/29/8 (CVE request) [5] http://www.openwall.com/lists/oss-security/2011/11/29/13 (CVE assignment)
This issue affects the versions of the lighttpd package, as shipped with Fedora EPEL 4, 5, and 6. Please schedule an update. -- This issue affects the versions of the lighttpd package, as shipped with Fedora release of 14, 15, and 16. Please schedule an update.
Created lighttpd tracking bugs for this issue Affects: fedora-all [bug 758625] Affects: epel-all [bug 758626]
lighttpd-1.4.31-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
lighttpd-1.4.31-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
lighttpd-1.4.31-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
lighttpd-1.4.31-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.