Vulnerability Description
lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lighttpd | Lighttpd | < 1.4.33 |
| Debian | Debian Linux | 6.0 |
| Opensuse | Opensuse | 12.2 |
Related Weaknesses (CWE)
References
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txtVendor Advisory
- http://jvn.jp/en/jp/JVN37417423/index.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.htmlMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=141576815022399&w=2Issue TrackingThird Party Advisory
- http://secunia.com/advisories/55682Third Party Advisory
- http://www.openwall.com/lists/oss-security/2013/11/12/4Mailing ListThird Party Advisory
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310Third Party Advisory
- https://www.debian.org/security/2013/dsa-2795Third Party Advisory
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txtVendor Advisory
- http://jvn.jp/en/jp/JVN37417423/index.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.htmlMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=141576815022399&w=2Issue TrackingThird Party Advisory
- http://secunia.com/advisories/55682Third Party Advisory
- http://www.openwall.com/lists/oss-security/2013/11/12/4Mailing ListThird Party Advisory
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310Third Party Advisory
FAQ
What is CVE-2013-4559?
CVE-2013-4559 is a vulnerability with a CVSS score of 7.6 (HIGH). lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attacke...
How severe is CVE-2013-4559?
CVE-2013-4559 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4559?
Check the references section above for vendor advisories and patch information. Affected products include: Lighttpd Lighttpd, Debian Debian Linux, Opensuse Opensuse.