USN-4775-1: Lighttpd vulnerabilities
15 March 2021
Lighttpd could be made to expose sensitive information over the network.
Releases
Packages
- lighttpd - fast webserver with minimal memory footprint
Details
It was discovered that Lighttpd did not properly sanitized the string used in
basic HTTP authentication method. A remote attacker could use this to inject
arbitrary log entries and maybe obtain sensitive information. This issue only
affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2015-3200)
It was discovered that Lighttpd did not properly sanitized the string used in
alias. A remote attacker could use this to access the content of the directory
above the alias and obtain sensitive information. (CVE-2018-19052)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
lighttpd
-
1.4.45-1ubuntu3.18.04.1+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
lighttpd
-
1.4.35-4ubuntu2.1+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
lighttpd
-
1.4.33-1+nmu2ubuntu2.1+esm1
Available with Ubuntu Pro
After a standard system update you need to restart Lighttpd to make
all the necessary changes.