Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2013-1427

Overview

Vulnerability Score 1.9 1.9
CVE Id CVE-2013-1427
Last Modified 22 Mar 2013 10:43:07
Published 21 Mar 2013 01:55:03
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector LOCAL
Access Complexity MEDIUM
Authentication NONE

CVE-2013-1427

Summary

The configuration file for the FastCGI PHP support for lighthttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.

Vulnerable Systems

Application

  • Lighttpd 1.3.16

  • Lighttpd 1.4.10

  • Lighttpd 1.4.11

  • Lighttpd 1.4.12

  • Lighttpd 1.4.13

  • Lighttpd 1.4.15

  • Lighttpd 1.4.16

  • Lighttpd 1.4.18

  • Lighttpd 1.4.19

  • Lighttpd 1.4.20

  • Lighttpd 1.4.21

  • Lighttpd 1.4.22

  • Lighttpd 1.4.23

  • Lighttpd 1.4.24

  • Lighttpd 1.4.25

  • Lighttpd 1.4.26

  • Lighttpd 1.4.27

  • Lighttpd 1.4.3

  • Lighttpd 1.4.4

  • Lighttpd 1.4.5

  • Lighttpd 1.4.6

  • Lighttpd 1.4.7

  • Lighttpd 1.4.8

  • Lighttpd 1.4.9


References

XF - lighttpd-cve20131427-symlink(82897)

BID - 58528

DEBIAN - DSA-2649

OSVDB - 91462


Last Updated: 27 May 2016 11:02:07