Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14919
HistoryNov 05, 2006 - 12:00 a.m.

[SECURITY] [DSA-1205-1] New thttpd packages fix insecure temporary file creation

2006-11-0500:00:00
vulners.com
27

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Debian Security Advisory DSA 1205-1 [email protected]
http://www.debian.org/security/ Steve Kemp
November 2rd, 2006 http://www.debian.org/security/faq


Package : thttpd
Vulnerability : insecure temporary files
Problem-Type : local
Debian-specific: yes
CVE ID : CVE-2006-4248
Debian Bug : 396277

Marco d'Itri discovered that thttpd, a small, fast and secure webserver,
makes use of insecure temporary files when its logfiles are rotated,
which might lead to a denial of service through a symlink attack.

For the stable distribution (sarge) this problem has been fixed in
version 2.23beta1-3sarge2

For the unstable distribution (sid) this problem has been fixed in
version 2.23beta1-5

We recommend that you upgrade your thttpd package.

Upgrade Instructions


wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.dsc
  Size/MD5 checksum:      614 0f9a3730f341fa0151596a3b9f20764d
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.diff.gz
  Size/MD5 checksum:    14313 8545dd3d0f7a2083ecca36e53e72bd6b
http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1.orig.tar.gz
  Size/MD5 checksum:   128712 d3d91f6596f53d5e2b27cea8607d5bba

Alpha architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_alpha.deb
  Size/MD5 checksum:    59240 f6854853b290fe2ce1a925cbbea3856a
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_alpha.deb
  Size/MD5 checksum:    27978 6b4680363644b459e0e47222985f749f

AMD64 architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_amd64.deb
  Size/MD5 checksum:    56034 9848065d7700f2f6e0a036ee76e8fcf7
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_amd64.deb
  Size/MD5 checksum:    26456 befb78e032aa654e5fcfcc7c9fdff21b

ARM architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_arm.deb
  Size/MD5 checksum:    53198 6a9c1e8afaa60a7b4b7787729dd97b9b
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_arm.deb
  Size/MD5 checksum:    24610 f35f8b0a749694fea536296d2a41e1f0

HP Precision architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_hppa.deb
  Size/MD5 checksum:    57374 4755b42efc9a48b59b1e745862e01098
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_hppa.deb
  Size/MD5 checksum:    26912 557472d5a3e182b86999baa0b89846ba

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_i386.deb
  Size/MD5 checksum:    51180 991b1072ebd903b6a9ee316b1bfdc8c6
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_i386.deb
  Size/MD5 checksum:    24776 fd3dddb60d160a6245da4c7efd5dcfe4

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_ia64.deb
  Size/MD5 checksum:    71954 924db7bf3beb5ce3c0e5018759aef3d6
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_ia64.deb
  Size/MD5 checksum:    30276 530abc02e3c392a91bff06fe1d8ce7af

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_m68k.deb
  Size/MD5 checksum:    50132 bcb24b62afb868c5e04b8c1db66e6cc3
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_m68k.deb
  Size/MD5 checksum:    24756 4b30d87639b3d6b7ca58537cf16c6953

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_mips.deb
  Size/MD5 checksum:    57044 410e480e061a3876b7ff01beaffb571e
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_mips.deb
  Size/MD5 checksum:    30980 2cda342ba6a04fdbe0a938359eeff813

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_mipsel.deb
  Size/MD5 checksum:    57112 fe0268048af2940619a9380d7cd83626
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_mipsel.deb
  Size/MD5 checksum:    31126 64e73613ca88afa3fd379b657c80a414

PowerPC architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_powerpc.deb
  Size/MD5 checksum:    53442 58c39568158a4c3da81efcaf6a0ab838
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_powerpc.deb
  Size/MD5 checksum:    25160 a5ff28da9df6080438012db8014b0212

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_s390.deb
  Size/MD5 checksum:    56214 f39998665c2df9236d2902120eb977f9
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_s390.deb
  Size/MD5 checksum:    26268 34e822b698803e3e0139430aea707f55

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_sparc.deb
  Size/MD5 checksum:    53298 a8dcaf92cb41b607618b4a271927c250
http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_sparc.deb
  Size/MD5 checksum:    24718 54c4e9dac68c9b8472dc92fe6966f6e4

These files will probably be moved into the stable distribution on
its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/&lt;pkg&gt;

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFS2LgwM/Gs81MDZ0RAnTSAKDXWzYWgkLAGInrnLQHIZUmQGKUPQCgh57J
Aq8fa0owdwsZOniP0bvjwaI=
=oJgN
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:14919