Activity log for bug #34625

Date Who What changed Old value New value Message
2006-03-12 17:45:21 pherris bug added bug
2006-03-12 17:48:09 pherris description httpd 2.23b1: defang() Remote Buffer Overflow Vulnerability From: http://www.securityfocus.com/bid/8906 : "A vulnerability has been reported in thttpd that may allow a remote attacker to execute arbitrary code on vulnerable host. The issue is reported to exist due to a lack of bounds checking by software, leading to a buffer overflow condition. The problem is reported to exist in the defang() function in libhttpd.c. This issue may allow an attacker to gain unauthorized access to a vulnerable host. Successful exploitation of this issue may allow an attacker to execute arbitrary code in the context of the web server in order to gain unauthorized access to a vulnerable system. thttpd versions 2.21 to 2.23b1 have been reported to be prone to this issue, however other versions may be affected as well." Debian is serving the same version as Ubuntu. Current version from the author's website: http://www.acme.com/software/thttpd/thttpd-2.25b.tar.gz httpd 2.23b1: defang() Remote Buffer Overflow Vulnerability From: http://www.securityfocus.com/bid/8906 : "A vulnerability has been reported in thttpd that may allow a remote attacker to execute arbitrary code on vulnerable host. The issue is reported to exist due to a lack of bounds checking by software, leading to a buffer overflow condition. The problem is reported to exist in the defang() function in libhttpd.c. This issue may allow an attacker to gain unauthorized access to a vulnerable host. Successful exploitation of this issue may allow an attacker to execute arbitrary code in the context of the web server in order to gain unauthorized access to a vulnerable system. thttpd versions 2.21 to 2.23b1 have been reported to be prone to this issue, however other versions may be affected as well." Debian is serving the same version as Ubuntu. thttpd release notes: http://www.acme.com/software/thttpd/#releasenotes . Current version from the author's website: http://www.acme.com/software/thttpd/thttpd-2.25b.tar.gz
2006-03-12 17:48:09 pherris summary "A vulnerability has been reported in thttpd that may allow a remote attacker to execute arbitrary code on vulnerable host. The issue is reported to exist due to a lack of bounds checking by software, leading to a buffer overflow condition. The problem is reported to exist in the defang() function in libhttpd.c."
2006-03-12 18:12:40 pherris thttpd: status Unconfirmed Rejected
2006-03-12 18:12:40 pherris thttpd: statusexplanation Current version is a patched version of 2.23b1. See: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=216677