Summary
Stefan Bühler discovered that the Debian specific configuration file for lighttpd webserver FastCGI PHP support used a fixed socket name in the world-writable /tmp directory. A symlink attack or a race condition could be exploited by a malicious user on the same machine to take over the PHP control socket and for example force the webserver to use a different PHP version.
As the fix is in a configuration file lying in /etc, the update won't be enforced if the file has been modified by the administrator. In that case, care should be taken to manually apply the fix.
Solution
For the stable distribution (squeeze), this problem has been fixed in version 1.4.28-2+squeeze1.3.
For the testing distribution (wheezy), this problem has been fixed in version 1.4.31-4.
For the unstable distribution (sid), this problem has been fixed in version 1.4.31-4.
We recommend that you upgrade your lighttpd packages.
Insight
lighttpd is a small webserver and fast webserver developed with security in mind and a lot of features.
It has support for
* CGI, FastCGI and SSI
* virtual hosts
* URL rewriting
* authentication (plain files, htpasswd, ldap)
* transparent content compression
* conditional configuration
and configuration is straight-forward and easy.
Affected
lighttpd on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-1427 -
CVSS Base Score: 1.9
AV:L/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities