Vulnerability Description
thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Acme Labs | Thttpd | <= 2.24 |
References
- http://bugs.gentoo.org/show_bug.cgi?id=142047PatchVendor Advisory
- http://osvdb.org/31965
- http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Executi
- http://seclists.org/fulldisclosure/2023/Nov/13
- http://secunia.com/advisories/24018PatchVendor Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200701-28.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/22349Vendor Advisory
- http://bugs.gentoo.org/show_bug.cgi?id=142047PatchVendor Advisory
- http://osvdb.org/31965
- http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Executi
- http://seclists.org/fulldisclosure/2023/Nov/13
- http://secunia.com/advisories/24018PatchVendor Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200701-28.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/22349Vendor Advisory
FAQ
What is CVE-2007-0664?
CVE-2007-0664 is a vulnerability with a CVSS score of 5.0 (MEDIUM). thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files.
How severe is CVE-2007-0664?
CVE-2007-0664 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0664?
Check the references section above for vendor advisories and patch information. Affected products include: Acme Labs Thttpd.