<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">lighttpd-1.4.59-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10585-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">lighttpd-1.4.59-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the lighttpd-1.4.59-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10585</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1869/</URL>
      <Description>SUSE CVE CVE-2007-1869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-1870/</URL>
      <Description>SUSE CVE CVE-2007-1870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-0983/</URL>
      <Description>SUSE CVE CVE-2008-0983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1111/</URL>
      <Description>SUSE CVE CVE-2008-1111 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1270/</URL>
      <Description>SUSE CVE CVE-2008-1270 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-1531/</URL>
      <Description>SUSE CVE CVE-2008-1531 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2008-4359/</URL>
      <Description>SUSE CVE CVE-2008-4359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19052/</URL>
      <Description>SUSE CVE CVE-2018-19052 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-1.4.59-2.1">lighttpd-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_authn_gssapi-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_authn_gssapi-1.4.59-2.1">lighttpd-mod_authn_gssapi-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_authn_ldap-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_authn_ldap-1.4.59-2.1">lighttpd-mod_authn_ldap-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_authn_mysql-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_authn_mysql-1.4.59-2.1">lighttpd-mod_authn_mysql-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_authn_pam-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_authn_pam-1.4.59-2.1">lighttpd-mod_authn_pam-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_authn_sasl-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_authn_sasl-1.4.59-2.1">lighttpd-mod_authn_sasl-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_cml-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_cml-1.4.59-2.1">lighttpd-mod_cml-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_magnet-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_magnet-1.4.59-2.1">lighttpd-mod_magnet-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_maxminddb-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_maxminddb-1.4.59-2.1">lighttpd-mod_maxminddb-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_mysql_vhost-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_mysql_vhost-1.4.59-2.1">lighttpd-mod_mysql_vhost-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_rrdtool-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_rrdtool-1.4.59-2.1">lighttpd-mod_rrdtool-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_trigger_b4_dl-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_trigger_b4_dl-1.4.59-2.1">lighttpd-mod_trigger_b4_dl-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_vhostdb_dbi-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_vhostdb_dbi-1.4.59-2.1">lighttpd-mod_vhostdb_dbi-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_vhostdb_ldap-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_vhostdb_ldap-1.4.59-2.1">lighttpd-mod_vhostdb_ldap-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_vhostdb_mysql-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_vhostdb_mysql-1.4.59-2.1">lighttpd-mod_vhostdb_mysql-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_vhostdb_pgsql-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_vhostdb_pgsql-1.4.59-2.1">lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="lighttpd-mod_webdav-1.4.59-2.1">
      <FullProductName ProductID="lighttpd-mod_webdav-1.4.59-2.1">lighttpd-mod_webdav-1.4.59-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="lighttpd-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-1.4.59-2.1">lighttpd-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_authn_gssapi-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1">lighttpd-mod_authn_gssapi-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_authn_ldap-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1">lighttpd-mod_authn_ldap-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_authn_mysql-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1">lighttpd-mod_authn_mysql-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_authn_pam-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1">lighttpd-mod_authn_pam-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_authn_sasl-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1">lighttpd-mod_authn_sasl-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_cml-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1">lighttpd-mod_cml-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_magnet-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1">lighttpd-mod_magnet-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_maxminddb-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1">lighttpd-mod_maxminddb-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_mysql_vhost-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1">lighttpd-mod_mysql_vhost-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_rrdtool-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1">lighttpd-mod_rrdtool-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_trigger_b4_dl-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1">lighttpd-mod_trigger_b4_dl-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_vhostdb_dbi-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1">lighttpd-mod_vhostdb_dbi-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_vhostdb_ldap-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1">lighttpd-mod_vhostdb_ldap-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_vhostdb_mysql-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1">lighttpd-mod_vhostdb_mysql-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_vhostdb_pgsql-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1">lighttpd-mod_vhostdb_pgsql-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="lighttpd-mod_webdav-1.4.59-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1">lighttpd-mod_webdav-1.4.59-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lighttpd 1.4.12 and 1.4.13 allows remote attackers to cause a denial of service (cpu and resource consumption) by disconnecting while lighttpd is parsing CRLF sequences, which triggers an infinite loop and file descriptor consumption.</Note>
    </Notes>
    <CVE>CVE-2007-1869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1869.html</URL>
        <Description>CVE-2007-1869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/246945</URL>
        <Description>SUSE Bug 246945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/284831</URL>
        <Description>SUSE Bug 284831</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lighttpd before 1.4.14 allows attackers to cause a denial of service (crash) via a request to a file whose mtime is 0, which results in a NULL pointer dereference.</Note>
    </Notes>
    <CVE>CVE-2007-1870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-1870.html</URL>
        <Description>CVE-2007-1870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/246945</URL>
        <Description>SUSE Bug 246945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/284831</URL>
        <Description>SUSE Bug 284831</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.</Note>
    </Notes>
    <CVE>CVE-2008-0983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-0983.html</URL>
        <Description>CVE-2008-0983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/364517</URL>
        <Description>SUSE Bug 364517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information.</Note>
    </Notes>
    <CVE>CVE-2008-1111</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1111.html</URL>
        <Description>CVE-2008-1111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/366526</URL>
        <Description>SUSE Bug 366526</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.</Note>
    </Notes>
    <CVE>CVE-2008-1270</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1270.html</URL>
        <Description>CVE-2008-1270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/368962</URL>
        <Description>SUSE Bug 368962</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost.</Note>
    </Notes>
    <CVE>CVE-2008-1531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-1531.html</URL>
        <Description>CVE-2008-1531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/374761</URL>
        <Description>SUSE Bug 374761</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive information or possibly modify data.</Note>
    </Notes>
    <CVE>CVE-2008-4359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2008-4359.html</URL>
        <Description>CVE-2008-4359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/429764</URL>
        <Description>SUSE Bug 429764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.</Note>
    </Notes>
    <CVE>CVE-2018-19052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:lighttpd-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_cml-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_mysql_vhost-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_trigger_b4_dl-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.59-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.59-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19052.html</URL>
        <Description>CVE-2018-19052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115016</URL>
        <Description>SUSE Bug 1115016</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
