Cryptographic Issues Affecting lighttpd package, versions <1.4.31-4


Severity

Recommended
0.0
low
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cryptographic Issues vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-LIGHTTPD-5686276
  • published21 Mar 2013
  • disclosed21 Mar 2013

Introduced: 21 Mar 2013

CVE-2013-1427  (opens in a new tab)
CWE-310  (opens in a new tab)

How to fix?

Upgrade Debian:13 lighttpd to version 1.4.31-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lighttpd package and not the lighttpd package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.

CVSS Scores

version 3.1