Bugzilla – Bug 849059
VUL-0: CVE-2013-4508: lighttpd using vulnerable cipher suites with SNI
Last modified: 2014-01-15 17:04:32 UTC
CVE-2013-4508 When defining an ssl.cipher-list, it works for the 'default' HTTPS setup ($SERVER["socket"] 443 block), but when you utilize SNI ($HTTP["host"] blocks within the $SERVER["socket"] block) the ssl.cipher-list seems to not inherit into the host blocks and instead will default to include all of the available openssl ciphers (except SSL v2/v3 based if those are disabled). References: http://comments.gmane.org/gmane.comp.security.oss.general/11414 http://redmine.lighttpd.net/issues/2525
bugbot adjusting priority
submitted for 12.2 and newer. the SNI feature is not present in any of the SLES versions.
will be released soonish
released
openSUSE-SU-2014:0072-1: An update that fixes three vulnerabilities is now available. Category: security (moderate) Bug References: 849059,850468,850469 CVE References: CVE-2013-4508,CVE-2013-4559,CVE-2013-4560 Sources used: openSUSE 13.1 (src): lighttpd-1.4.32-2.5.1 openSUSE 12.3 (src): lighttpd-1.4.31-6.5.1 openSUSE 12.2 (src): lighttpd-1.4.31-4.13.1
openSUSE-SU-2014:0074-1: An update that solves one vulnerability and has three fixes is now available. Category: security (moderate) Bug References: 790258,849059,850468,850469 CVE References: CVE-2012-5533 Sources used: openSUSE 11.4 (src): lighttpd-1.4.32-37.1