Permissions, Privileges, and Access Controls in lighttpd (Alpine package)



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2013-4559
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Adobe Commerce (formerly Magento Commerce)
Web applications / E-Commerce systems

lighttpd (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Magento, Inc
Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU32620

Risk: High

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2013-4559

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Adobe Commerce (formerly Magento Commerce): 1.12.0.2

lighttpd (Alpine package): 0.1.17.16 - 0.1.17.17

lighttpd (Alpine package): 2.17.2 - 2.17.3

lighttpd (Alpine package): 1.1.24 - 1.1.25

lighttpd (Alpine package): 20040311 - 20101020ubuntu205

lighttpd (Alpine package): 1.34ubuntu6

lighttpd (Alpine package): 0.6.3-1 - 0.6.3-2

lighttpd (Alpine package): 0.7.5-0ubuntu1.18

lighttpd (Alpine package): 4.2.1

lighttpd (Alpine package): 6.2

lighttpd (Alpine package):

lighttpd (Alpine package): before 1.4.33-r1

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=6164d3a4445a58197b45c1fa3ee7f979d1a3cc10
https://git.alpinelinux.org/aports/commit/?id=97e3e4a22ce07cac395ee446b48a92f9ceceaaac
https://git.alpinelinux.org/aports/commit/?id=0238d08745129ac6330aec20e5f110bf3bec3599
https://git.alpinelinux.org/aports/commit/?id=0889a3519104f2dc0c76d35edda4bdc087d6ab56


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###