ALAS-2014-353

Related Vulnerabilities: CVE-2013-7038   CVE-2013-7039  

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header. The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read.

ALAS-2014-353


Amazon Linux AMI Security Advisory: ALAS-2014-353
Advisory Release Date: 2014-06-15 16:17 Pacific
Advisory Updated Date: 2014-09-19 10:20 Pacific
Severity: Important

Issue Overview:

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.

The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read.


Affected Packages:

libmicrohttpd


Issue Correction:
Run yum update libmicrohttpd to update your system.

New Packages:
i686:
    libmicrohttpd-devel-0.9.33-2.3.amzn1.i686
    libmicrohttpd-0.9.33-2.3.amzn1.i686
    libmicrohttpd-debuginfo-0.9.33-2.3.amzn1.i686

noarch:
    libmicrohttpd-doc-0.9.33-2.3.amzn1.noarch

src:
    libmicrohttpd-0.9.33-2.3.amzn1.src

x86_64:
    libmicrohttpd-devel-0.9.33-2.3.amzn1.x86_64
    libmicrohttpd-0.9.33-2.3.amzn1.x86_64
    libmicrohttpd-debuginfo-0.9.33-2.3.amzn1.x86_64