The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of lighttpd: use after free via Range Request

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via Range Request of lighttpd, in order to trigger a denial of service, and possibly to run code.
Severity of this bulletin: 3/4.
Creation date: 13/08/2018.
Références of this threat: FEDORA-2018-a31054181a, FEDORA-2018-be770f97a6, FEDORA-2018-cd5a9c3c0f, VIGILANCE-VUL-26973.

Description of the vulnerability

An attacker can force the usage of a freed memory area via Range Request of lighttpd, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

This computer vulnerability bulletin impacts software or systems such as Fedora, lighttpd.

Our Vigil@nce team determined that the severity of this vulnerability bulletin is important.

The trust level is of type confirmed by the editor, with an origin of internet client.

An attacker with a expert ability can exploit this threat note.

Solutions for this threat

lighttpd: version 1.4.50.
The version 1.4.50 is fixed:
  https://www.lighttpd.net/download/

Fedora: new lighttpd packages.
New packages are available:
  Fedora 28: lighttpd 1.4.50-1.fc28
  Fedora 29: lighttpd 1.4.51-1.fc29
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer security watch. The technology watch team tracks security threats targeting the computer system.