|Category:||Mageia Linux Local Security Checks|
|Title:||Mageia Linux Local Check: mgasa-2015-0338|
|Summary:||Mageia Linux Local Security Checks mgasa-2015-0338|
Mageia Linux Local Security Checks mgasa-2015-0338
Updated lighttpd packages fix security vulnerability: mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character (CVE-2015-3200). The lighttpd package has been updated to version 1.4.37, fixing this issue and several other bugs. In the Mageia 4 package, improvements have been made to the logrotate configuration and systemd service, allowing graceful reloading of configuration files and proper re-opening of log files (mga#15948, mga#15980).
Update the affected packages to the latest available version.
Common Vulnerability Exposure (CVE) ID: CVE-2015-3200|
BugTraq ID: 74813
|Copyright||Copyright (C) 2015 Eero Volotinen|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.