Vulnerabilities > CVE-2011-4362

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
lighttpd
debian
nessus
exploit available

Summary

Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.

Exploit-Db

descriptionlighttpd Denial of Service Vulnerability PoC. CVE-2011-4362. Dos exploit for linux platform
fileexploits/linux/dos/18295.txt
idEDB-ID:18295
last seen2016-02-02
modified2011-12-31
platformlinux
port
published2011-12-31
reporterpi3
sourcehttps://www.exploit-db.com/download/18295/
titlelighttpd Denial of Service Vulnerability PoC
typedos

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-9078.NASL
    descriptionThis update fixes CVE-2011-4362 by updating to the latest release. It also fixes problems that had been reported with previous releases, such as ssl-related crashes on startup. This update fixes some minor SSL related problems, as well as a connection stall bug. This update fixes some minor SSL related problems, as well as a connection stall bug. This update fixes some minor SSL related problems, as well as a connection stall bug. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-06-26
    plugin id59690
    published2012-06-26
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59690
    titleFedora 16 : lighttpd-1.4.31-1.fc16 (2012-9078)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2012-9078.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(59690);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2011-4362");
      script_bugtraq_id(50851);
      script_xref(name:"FEDORA", value:"2012-9078");
    
      script_name(english:"Fedora 16 : lighttpd-1.4.31-1.fc16 (2012-9078)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update fixes CVE-2011-4362 by updating to the latest release. It
    also fixes problems that had been reported with previous releases,
    such as ssl-related crashes on startup. This update fixes some minor
    SSL related problems, as well as a connection stall bug. This update
    fixes some minor SSL related problems, as well as a connection stall
    bug. This update fixes some minor SSL related problems, as well as a
    connection stall bug.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=758624"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2012-June/082686.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?7b2b223c"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected lighttpd package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:lighttpd");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:16");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2012/06/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/26");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^16([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 16.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC16", reference:"lighttpd-1.4.31-1.fc16")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "lighttpd");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_C6521B04314B11E19CF45404A67EEF98.NASL
    descriptionUS-CERT/NIST reports : Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.
    last seen2020-06-01
    modified2020-06-02
    plugin id57411
    published2011-12-29
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57411
    titleFreeBSD : lighttpd -- remote DoS in HTTP authentication (c6521b04-314b-11e1-9cf4-5404a67eef98)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201406-10.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201406-10 (lighttpd: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in lighttpd. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could create a Denial of Service condition. Futhermore, a remote attacker may be able to execute arbitrary SQL statements. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id76062
    published2014-06-16
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/76062
    titleGLSA-201406-10 : lighttpd: Multiple vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2368.NASL
    descriptionSeveral vulnerabilities have been discovered in lighttpd, a small and fast webserver with minimal memory footprint. - CVE-2011-4362 Xi Wang discovered that the base64 decoding routine which is used to decode user input during an HTTP authentication, suffers of a signedness issue when processing user input. As a result it is possible to force lighttpd to perform an out-of-bounds read which results in Denial of Service conditions. - CVE-2011-3389 When using CBC ciphers on an SSL enabled virtual host to communicate with certain client, a so called
    last seen2020-03-17
    modified2012-01-12
    plugin id57508
    published2012-01-12
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57508
    titleDebian DSA-2368-1 : lighttpd - multiple vulnerabilities (BEAST)
  • NASL familyWeb Servers
    NASL idLIGHTTPD_1_4_30.NASL
    descriptionAccording to its banner, the version of lighttpd running on the remote host is prior to 1.4.30. It is, therefore, affected by a denial of service vulnerability. The HTTP server allows out-of-bounds values to be decoded during the auth process and later uses these values as offsets. Using negative values as offsets can result in application crashes. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id57410
    published2011-12-28
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57410
    titlelighttpd < 1.4.30 base64_decode Function Out-of-Bounds Read Error DoS
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_LIGHTTPD_20120417.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index. (CVE-2011-4362)
    last seen2020-06-01
    modified2020-06-02
    plugin id80697
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80697
    titleOracle Solaris Third-Party Patch Update : lighttpd (cve_2011_4362_denial_of)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_LIGHTTPD-120130.NASL
    descriptionThis update of lighttpd fixes an out-of-bounds read due to a signedness error which could cause a Denial of Service (CVE-2011-4362). Additionally an option was added to honor the server cipher order (resolves lighttpd#2364).
    last seen2020-06-05
    modified2014-06-13
    plugin id75941
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75941
    titleopenSUSE Security Update : lighttpd (openSUSE-SU-2012:0240-1)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2012-107.NASL
    descriptionInteger signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.
    last seen2020-06-01
    modified2020-06-02
    plugin id69597
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69597
    titleAmazon Linux AMI : lighttpd (ALAS-2012-107)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2012-110.NASL
    description - added lighttpd-1.4.30_head_fixes.patch: cherry picked 4 fixes from HEAD : - [ssl] include more headers explicitly - list all network handlers in lighttpd -V (fixes lighttpd#2376) - Move fdevent subsystem includes to implementation files to reduce conflicts (fixes lighttpd#2373) - [ssl] fix segfault in counting renegotiations for openssl versions without TLSEXT/SNI - update to 1.4.30: (bnc#733607) - Always use our &lsquo;own&rsquo; md5 implementation, fixes linking issues on MacOS (fixes #2331) - Limit amount of bytes we send in one go; fixes stalling in one connection and timeouts on slow systems. - [ssl] fix build errors when Elliptic-Curve Diffie-Hellman is disabled - Add static-file.disable-pathinfo option to prevent handling of urls like &hellip;/secret.php/image.jpg as static file - Don&rsquo;t overwrite 401 (auth required) with 501 (unknown method) (fixes #2341) - Fix mod_status bug: always showed &ldquo;0/0&rdquo; in the &ldquo;Read&rdquo; column for uploads (fixes #2351) - [mod_auth] Fix signedness error in http_auth (fixes #2370, CVE-2011-4362) - [ssl] count renegotiations to prevent client renegotiations - [ssl] add option to honor server cipher order (fixes #2364, BEAST attack) - [core] accept dots in ipv6 addresses in host header (fixes #2359) - [ssl] fix ssl connection aborts if files are larger than the MAX_WRITE_LIMIT (256kb) - [libev/cgi] fix waitpid ECHILD errors in cgi with libev (fixes #2324) - add automake as buildrequire to avoid implicit dependency
    last seen2020-06-05
    modified2014-06-13
    plugin id74546
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/74546
    titleopenSUSE Security Update : lighttpd (openSUSE-2012-110)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-9040.NASL
    descriptionThis update fixes CVE-2011-4362 by updating to the latest release. It also fixes problems that had been reported with previous releases, such as ssl-related crashes on startup. This update fixes some minor SSL related problems, as well as a connection stall bug. This update fixes some minor SSL related problems, as well as a connection stall bug. This update fixes some minor SSL related problems, as well as a connection stall bug. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-06-26
    plugin id59689
    published2012-06-26
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59689
    titleFedora 17 : lighttpd-1.4.31-1.fc17 (2012-9040)

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:72453
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-72453
    titlelighttpd Denial of Service Vulnerability PoC
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:30003
    last seen2017-11-19
    modified2012-01-02
    published2012-01-02
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-30003
    titleLighttpd Proof of Concept code for CVE-2011-4362
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:26120
    last seen2017-11-19
    modified2011-12-27
    published2011-12-27
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-26120
    titleLighttpd 1.4.30 / 1.5 Denial Of Service
  • bulletinFamilyexploit
    descriptionCVE-2011-4362 Lighttpd是一款轻型的开放源码Web Server软件包。 lighttpd在认证数据的解码实现上存在漏洞,攻击者可能利用此漏洞使应用程序崩溃造成拒绝服务。 http_auth.c中的代码在base64解码用户输入的认证数据时使用&quot;const char *in&quot;类型,并将每个字符转换为&quot;int ch&quot;作为映射表的索引,大于0x80的字符就会导致负索引,可能造成非法内存访问。 lighttpd <=1.4.29 厂商补丁: LightTPD -------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.lighttpd.net/
    idSSV:24275
    last seen2017-11-19
    modified2011-12-01
    published2011-12-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-24275
    titlelighttpd mod_auth模块base64 拒绝服务漏洞