Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 214892 - www-servers/lighttpd <1.4.19-r2 closing of foreign SSL connections (DoS) (CVE-2008-1531)
Summary: www-servers/lighttpd <1.4.19-r2 closing of foreign SSL connections (DoS) (CVE...
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
Whiteboard: B3 [glsa]
Depends on:
Blocks: 213164
  Show dependency tree
Reported: 2008-03-26 15:30 UTC by Christian Hoffmann (RETIRED)
Modified: 2020-04-08 21:46 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Christian Hoffmann (RETIRED) gentoo-dev 2008-03-26 15:30:00 UTC
lighttpd-1.4.19 and earlier contain a bug which can be exploited by a malicious user to forcefully close foreign SSL connections.
To exploit this, the server has to have SSL support enabled and the attacker has to trigger an SSL error on his own connection (connecting and disconnecting before the download has finished is enough).

Original ticket:

lighttpd-1.4.19 was supposed to fix the problem, but the fix did not work as expected, so it is still vulnerable.

The damage, which can be caused by this bug is rather low, I'd say: Firstly, users can simply reconnect after their connection has been killed, and secondly, it is hard for an attacker to meet the exact point of time to crash a user's connection, it is mostly a problem when there are longer-pending connections such as downloads or keepalive.
Comment 1 Thilo Bangert (RETIRED) (RETIRED) gentoo-dev 2008-03-26 20:24:07 UTC
1.4.19-r1 is in the tree
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2008-03-26 20:44:35 UTC
Arches, please test and mark stable:
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 release sh sparc x86"
Comment 3 Markus Meier gentoo-dev 2008-03-26 22:01:39 UTC
amd64/x86 stable
Comment 4 Christian Hoffmann (RETIRED) gentoo-dev 2008-03-26 22:46:54 UTC
I fail, sorry.

The fix does not seem completely right again... it makes lighty enter some kind of infinite loop in case of SSL errors, printing lots of SSL error messages and consuming lots of CPU.

Working on it.
Drop stable again? p.mask?
Comment 5 Robert Buchholz (RETIRED) gentoo-dev 2008-03-26 22:50:44 UTC
amd64, x86, please read above.
Comment 6 Markus Meier gentoo-dev 2008-03-26 22:59:19 UTC
amd64/x86 unstable :)
Comment 7 Christian Hoffmann (RETIRED) gentoo-dev 2008-03-26 23:27:45 UTC
bangert, I commented on the upstream ticket [1] with a possible new patch against 1.4.19 [2]. It works fine for me, but I'd rather have the OK from a lighty dev (they've been very responsive today, so I think we should get one pretty soon).

Sorry again for all the confusion and b0rkage. :(

Comment 8 Bertrand Jacquin 2008-03-26 23:38:47 UTC should be taken in account too :)
Comment 9 Christian Hoffmann (RETIRED) gentoo-dev 2008-03-26 23:45:46 UTC
Bertrand, thanks for the pointer, I saw that one already and I don't think it should be considered a vulnerability. It's a bug that lighty does not handle this situation more gracefully, but I don't see how an attacker could gain something by "exploiting" this bug.
After setting up lighty or making config changes, one will immediately (after trying to send a request) see that the new config is wrong (as lighty crashes).
Or... expressed differently: No working site will have such a config and as such nobody can exploit it.
At least that's my interpretation. =)
Comment 10 Bertrand Jacquin 2008-03-26 23:54:25 UTC
You're right, I didn't see the "only security" point. My fault.
Comment 11 Lars Hartmann 2008-03-28 10:43:45 UTC
please add "CVE-CVE-2008-1531"
Comment 12 Christian Hoffmann (RETIRED) gentoo-dev 2008-03-28 17:17:25 UTC
New patch from upstream [1], see the relevant ticket [2]. I created a diff against 1.4.19 [3] which is what we'll probably need. :)
Hopefully I tested it well enough this time. :p

Comment 13 Joe User 2008-03-30 19:05:26 UTC
(In reply to comment #7)
> [2]

That patch flooded my error.log with gigs of following errmsg bringing my server to start swapping and stopping to respond:
2008-03-30 20:39:10: (connections.c.1684) SSL: 5 error:00000000:lib(0):func(0):reason(0)

devnull ~ # emerge -pv lighttpd

These are the packages that would be merged, in order:

Calculating dependencies... done!
[ebuild   R   ] www-servers/lighttpd-1.4.19-r1  USE="bzip2 fam fastcgi gdbm pcre ssl xattr -doc -ipv6 -ldap -lua -memcache -minimal -mysql -php -rrdtool -test -webdav" 0 kB

Total: 1 package (1 reinstall), Size of downloads: 0 kB
devnull ~ # emerge --info
Portage (hardened/x86/2.6, gcc-3.4.6, glibc-2.7-r2, 2.6.23-hardened-r9 i686)
System uname: 2.6.23-hardened-r9 i686 AMD Athlon(tm) 64 X2 Dual Core Processor 5600+
Timestamp of tree: Sat, 29 Mar 2008 20:00:04 +0000
app-shells/bash:     3.2_p33
dev-lang/python:     2.5.1-r5
sys-devel/autoconf:  2.13, 2.61-r1
sys-devel/automake:  1.7.9-r1, 1.10.1
sys-devel/binutils:  2.18-r1
sys-devel/gcc-config: 1.4.0-r4
sys-devel/libtool:   1.5.26
virtual/os-headers:  2.6.24
CFLAGS="-O2 -pipe -march=k8 -fomit-frame-pointer -fforce-addr"
CONFIG_PROTECT_MASK="/etc/env.d /etc/fonts/fonts.conf /etc/gconf /etc/php/apache2-php5/ext-active/ /etc/php/cgi-php5/ext-active/ /etc/php/cli-php5/ext-active/ /etc/revdep-rebuild /etc/terminfo /etc/udev/rules.d"
CXXFLAGS="-O2 -pipe -march=k8 -fomit-frame-pointer -fforce-addr"
FEATURES="distlocks metadata-transfer sandbox sfperms strict unmerge-orphans userfetch"
PORTAGE_RSYNC_OPTS="--recursive --links --safe-links --perms --times --compress --force --whole-file --delete --stats --timeout=180 --exclude=/distfiles --exclude=/local --exclude=/packages"
USE="acl berkdb bzip2 caps cgi cli crypt expat fam fastcgi ftp gd gdbm glibc-omitfp gmp hardened hash iconv idn imap ithreads jpeg libwww logrotate md5sum mhash mime mmap mysql mysqli ncurses nls nocxx nptl nptlonly pam pcre perl pic png posix python readline sasl sharedmem sockets sse2 ssl symlink sysfs tcl tcpd threads tiff truetype ucs2 udev unicode urandom x86 xattr xml xmlrpc xsl zlib" ALSA_CARDS="ali5451 als4000 atiixp atiixp-modem bt87x ca0106 cmipci emu10k1    emu10k1x ens1370 ens1371 es1938 es1968 fm801 hda-intel intel8x0 intel8x0m       maestro3 trident usb-audio via82xx via82xx-modem ymfpci" ALSA_PCM_PLUGINS="adpcm alaw asym copy dmix dshare dsnoop empty extplug file hooks iec958 ioplug ladspa lfloat linear meter mulaw multi null plug rate route share shm softvol" APACHE2_MODULES="actions alias auth_basic authn_default authn_file authz_default authz_groupfile authz_host authz_owner authz_user autoindex deflate dir env expires ext_filter filter headers include log_config mime negotiation rewrite setenvif" APACHE2_MPMS="worker" ELIBC="glibc" INPUT_DEVICES="mouse keyboard" KERNEL="linux" LCD_DEVICES="bayrad cfontz cfontz633 glk hd44780 lb216 lcdm001 mtxorb ncurses text" LINGUAS="en" USERLAND="GNU" VIDEO_CARDS="apm ark chips cirrus cyrix dummy fbdev glint i128 i740 i810 imstt         mach64 mga neomagic nsc nv r128 radeon rendition s3 s3virge savage      siliconmotion sis sisusb tdfx tga trident tseng v4l vesa vga via vmware    voodoo"

Comment 14 Christian Hoffmann (RETIRED) gentoo-dev 2008-03-30 19:16:31 UTC
I'm not sure if I undestood you correctly -- are you using lighttpd-1.4.19-r1 from the tree, as indicated by the emerge -pv output? Then this is expected, as I already noted. Someone should commit -r2 with the new patch, as noted by me in comment #12.
bangert, I can do it if you want me to, but I'll leave for holidays in some hours, so... ;)
Comment 15 Thilo Bangert (RETIRED) (RETIRED) gentoo-dev 2008-03-31 06:18:41 UTC
hoffie: feel free to do any bumps on lighttpd. as the metadata indicates, i'm not considering myself the/a maintainer for lighttpd - i just do bumps as necessary / my time permits. anybody is more than welcome to have his take at the ebuild (especially in situations like these).

1.4.19-r2 is in the tree. as i didnt test ssl, please do so!
Comment 16 Robert Buchholz (RETIRED) gentoo-dev 2008-03-31 16:15:17 UTC
Joe, can you please confirm which patch you used and retry with the committed -r2? Really appreciated.
Comment 17 Joe User 2008-04-01 07:23:43 UTC
Yes i used 1.4.19-r1, with the new 1.4.19-r2 its fine for me.

Comment 18 Robert Buchholz (RETIRED) gentoo-dev 2008-04-01 11:08:30 UTC
Thanks for clearing that up.

Arches, please test and mark stable:
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 release sh sparc x86"
Comment 19 Jeroen Roovers (RETIRED) gentoo-dev 2008-04-01 13:52:31 UTC
Stable for HPPA.
Comment 20 Raúl Porcel (RETIRED) gentoo-dev 2008-04-01 16:13:18 UTC
alpha/ia64/sparc stable
Comment 21 Markus Rothe (RETIRED) gentoo-dev 2008-04-02 15:48:52 UTC
ppc64 stable
Comment 22 Markus Meier gentoo-dev 2008-04-02 19:16:20 UTC
amd64/x86 stable
Comment 23 Tobias Scherbaum (RETIRED) gentoo-dev 2008-04-03 19:00:42 UTC
ppc stable
Comment 24 Robert Buchholz (RETIRED) gentoo-dev 2008-04-03 22:42:44 UTC
GLSA vote: YES.
Comment 25 Peter Volkov (RETIRED) gentoo-dev 2008-04-04 04:58:31 UTC
Fixed in release snapshot.
Comment 26 Matt Fleming (RETIRED) gentoo-dev 2008-04-10 13:49:12 UTC
I vote YES. GLSA request filed.
Comment 27 Tobias Heinlein (RETIRED) gentoo-dev 2008-04-10 15:43:17 UTC
GLSA 200804-08