Mandriva Linux Security Advisory : lighttpd (MDVSA-2013:277)

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote Mandriva Linux host is missing one or more security

Description :

Updated lighttpd packages fix security vulnerabilities :

lighttpd before 1.4.34, when SNI is enabled, configures weak SSL
ciphers, which makes it easier for remote attackers to hijack sessions
by inserting packets into the client-server data stream or obtain
sensitive information by sniffing the network (CVE-2013-4508).

In lighttpd before 1.4.34, if setuid() fails for any reason, for
instance if an environment limits the number of processes a user can
have and the target uid already is at the limit, lighttpd will run as
root. A user who can run CGI scripts could clone() often; in this case
a lighttpd restart would end up with lighttpd running as root, and the
CGI scripts would run as root too (CVE-2013-4559).

In lighttpd before 1.4.34, if fam is enabled and there are directories
reachable from configured doc roots and aliases on which
FAMMonitorDirectory fails, a remote client could trigger a DoS

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.6
CVSS Temporal Score : 6.6
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 71031 ()

Bugtraq ID: 63534

CVE ID: CVE-2013-4508

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now