-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1205-1 security@xxxxxxxxxx http://www.debian.org/security/ Steve Kemp November 2rd, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : thttpd Vulnerability : insecure temporary files Problem-Type : local Debian-specific: yes CVE ID : CVE-2006-4248 Debian Bug : 396277 Marco d'Itri discovered that thttpd, a small, fast and secure webserver, makes use of insecure temporary files when its logfiles are rotated, which might lead to a denial of service through a symlink attack. For the stable distribution (sarge) this problem has been fixed in version 2.23beta1-3sarge2 For the unstable distribution (sid) this problem has been fixed in version 2.23beta1-5 We recommend that you upgrade your thttpd package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.dsc Size/MD5 checksum: 614 0f9a3730f341fa0151596a3b9f20764d http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2.diff.gz Size/MD5 checksum: 14313 8545dd3d0f7a2083ecca36e53e72bd6b http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1.orig.tar.gz Size/MD5 checksum: 128712 d3d91f6596f53d5e2b27cea8607d5bba Alpha architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_alpha.deb Size/MD5 checksum: 59240 f6854853b290fe2ce1a925cbbea3856a http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_alpha.deb Size/MD5 checksum: 27978 6b4680363644b459e0e47222985f749f AMD64 architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_amd64.deb Size/MD5 checksum: 56034 9848065d7700f2f6e0a036ee76e8fcf7 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_amd64.deb Size/MD5 checksum: 26456 befb78e032aa654e5fcfcc7c9fdff21b ARM architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_arm.deb Size/MD5 checksum: 53198 6a9c1e8afaa60a7b4b7787729dd97b9b http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_arm.deb Size/MD5 checksum: 24610 f35f8b0a749694fea536296d2a41e1f0 HP Precision architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_hppa.deb Size/MD5 checksum: 57374 4755b42efc9a48b59b1e745862e01098 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_hppa.deb Size/MD5 checksum: 26912 557472d5a3e182b86999baa0b89846ba Intel IA-32 architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge2_i386.deb Size/MD5 checksum: 51180 991b1072ebd903b6a9ee316b1bfdc8c6 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge2_i386.deb Size/MD5 checksum: 24776 fd3dddb60d160a6245da4c7efd5dcfe4 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_ia64.deb Size/MD5 checksum: 71954 924db7bf3beb5ce3c0e5018759aef3d6 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_ia64.deb Size/MD5 checksum: 30276 530abc02e3c392a91bff06fe1d8ce7af Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_m68k.deb Size/MD5 checksum: 50132 bcb24b62afb868c5e04b8c1db66e6cc3 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_m68k.deb Size/MD5 checksum: 24756 4b30d87639b3d6b7ca58537cf16c6953 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_mips.deb Size/MD5 checksum: 57044 410e480e061a3876b7ff01beaffb571e http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_mips.deb Size/MD5 checksum: 30980 2cda342ba6a04fdbe0a938359eeff813 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_mipsel.deb Size/MD5 checksum: 57112 fe0268048af2940619a9380d7cd83626 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_mipsel.deb Size/MD5 checksum: 31126 64e73613ca88afa3fd379b657c80a414 PowerPC architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_powerpc.deb Size/MD5 checksum: 53442 58c39568158a4c3da81efcaf6a0ab838 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_powerpc.deb Size/MD5 checksum: 25160 a5ff28da9df6080438012db8014b0212 IBM S/390 architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_s390.deb Size/MD5 checksum: 56214 f39998665c2df9236d2902120eb977f9 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_s390.deb Size/MD5 checksum: 26268 34e822b698803e3e0139430aea707f55 Sun Sparc architecture: http://security.debian.org/pool/updates/main/t/thttpd/thttpd_2.23beta1-3sarge1_sparc.deb Size/MD5 checksum: 53298 a8dcaf92cb41b607618b4a271927c250 http://security.debian.org/pool/updates/main/t/thttpd/thttpd-util_2.23beta1-3sarge1_sparc.deb Size/MD5 checksum: 24718 54c4e9dac68c9b8472dc92fe6966f6e4 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFFS2LgwM/Gs81MDZ0RAnTSAKDXWzYWgkLAGInrnLQHIZUmQGKUPQCgh57J Aq8fa0owdwsZOniP0bvjwaI= =oJgN -----END PGP SIGNATURE-----