Bug 1026566 (CVE-2013-4508) - CVE-2013-4508 lighttpd: uses vulnerable cipher suites when SNI is used
Summary: CVE-2013-4508 lighttpd: uses vulnerable cipher suites when SNI is used
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-4508
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1026567 1026568 1026569
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-11-05 01:05 UTC by Vincent Danen
Modified: 2019-09-29 13:09 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-06-13 19:35:52 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2013-11-05 01:05:34 UTC
The following flaw was reported [1] in lighttpd.  Currently a patch is in progress [2] but is not yet complete.

Lighttpd supported SNI (Server Name Indication) since version 1.4.24, and a typical SNI configuration would look like:

    $HTTP["Host"] == "example.com" {
        ssl.pemfile = "/etc/ssl/certs/example.com.pem"
    }
    $SERVER["socket"] == ":443" {
        ssl.engine = "enable"
        ssl.pemfile = "/etc/ssl/certs/default.pem"
        ssl.cipher-list = "HIGH"
    }

This configuration is vulnerable as it will use ssl.cipher-list = "DEFAULT" for "example.com",  which contains vulnerable cipher suites.

[1] http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
[2] http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.33_fix_ssl_sni.patch

Comment 2 Vincent Danen 2013-11-05 01:07:45 UTC
Created lighttpd tracking bugs for this issue:

Affects: fedora-all [bug 1026567]
Affects: epel-all [bug 1026568]

Comment 3 Vincent Danen 2014-06-13 19:35:52 UTC
Fixed in:

lighttpd-1.4.34-1.el5.1
lighttpd-1.4.34-1.el6
lighttpd-1.4.34-3.fc19
lighttpd-1.4.34-3.fc20


Note You need to log in before you can comment on or make changes to this bug.