Amazon Linux 1 Security Advisory: ALAS-2014-353
Advisory Release Date: 2014-06-15 16:17 Pacific
Advisory Updated Date: 2014-09-19 10:20 Pacific
Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.
The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read.
Affected Packages:
libmicrohttpd
Issue Correction:
Run yum update libmicrohttpd to update your system.
i686:
libmicrohttpd-devel-0.9.33-2.3.amzn1.i686
libmicrohttpd-0.9.33-2.3.amzn1.i686
libmicrohttpd-debuginfo-0.9.33-2.3.amzn1.i686
noarch:
libmicrohttpd-doc-0.9.33-2.3.amzn1.noarch
src:
libmicrohttpd-0.9.33-2.3.amzn1.src
x86_64:
libmicrohttpd-devel-0.9.33-2.3.amzn1.x86_64
libmicrohttpd-0.9.33-2.3.amzn1.x86_64
libmicrohttpd-debuginfo-0.9.33-2.3.amzn1.x86_64