- Home
- CVEs with nessus.description==Updated lighttpd packages fix security vulnerabilities :
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL
ciphers, which makes it easier for remote attackers to hijack sessions
by inserting packets into the client-server data stream or obtain
sensitive information by sniffing the network (CVE-2013-4508).
In lighttpd before 1.4.34, if setuid() fails for any reason, for
instance if an environment limits the number of processes a user can
have and the target uid already is at the limit, lighttpd will run as
root. A user who can run CGI scripts could clone() often; in this case
a lighttpd restart would end up with lighttpd running as root, and the
CGI scripts would run as root too (CVE-2013-4559).
In lighttpd before 1.4.34, if fam is enabled and there are directories
reachable from configured doc roots and aliases on which
FAMMonitorDirectory fails, a remote client could trigger a DoS
(CVE-2013-4560).
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top