Gentoo Archives: gentoo-announce

From: Sean Amoss <ackle@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201206-27 ] mini_httpd: Arbitrary code execution
Date: Sun, 24 Jun 2012 23:20:04
Message-Id: 4FE79EFB.3070908@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201206-27
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: mini_httpd: Arbitrary code execution
9 Date: June 24, 2012
10 Bugs: #303755
11 ID: 201206-27
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in mini_httpd could allow remote attackers to execute
19 arbitrary code.
20
21 Background
22 ==========
23
24 mini_httpd is a small webserver with optional SSL and IPv6 support.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-servers/mini_httpd *<= 1.19 Vulnerable!
33 -------------------------------------------------------------------
34 NOTE: Certain packages are still vulnerable. Users should migrate
35 to another package if one is available or wait for the
36 existing packages to be marked stable by their
37 architecture maintainers.
38
39 Description
40 ===========
41
42 mini_httpd does not properly check for shell escapes when parsing HTTP
43 requests.
44
45 Impact
46 ======
47
48 A remote attacker could send specially crafted HTTP requests, possibly
49 resulting in execution of arbitrary code with the privileges of the
50 process, or allowing for overwriting of files.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 Gentoo discontinued support for mini_httpd. We recommend that users
61 unmerge mini_httpd:
62
63 # emerge --unmerge "www-servers/mini_httpd"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2009-4490
69 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4490
70
71 Availability
72 ============
73
74 This GLSA and any updates to it are available for viewing at
75 the Gentoo Security Website:
76
77 http://security.gentoo.org/glsa/glsa-201206-27.xml
78
79 Concerns?
80 =========
81
82 Security is a primary focus of Gentoo Linux and ensuring the
83 confidentiality and security of our users' machines is of utmost
84 importance to us. Any security concerns should be addressed to
85 security@g.o or alternatively, you may file a bug at
86 https://bugs.gentoo.org.
87
88 License
89 =======
90
91 Copyright 2012 Gentoo Foundation, Inc; referenced text
92 belongs to its owner(s).
93
94 The contents of this document are licensed under the
95 Creative Commons - Attribution / Share Alike license.
96
97 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature