The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.
2013-03-21T17:55:03.117
2025-04-11T00:51:21.963
Deferred
CVSSv2: 1.9 (LOW)
AV:L/AC:M/Au:N/C:N/I:P/A:N
3.4
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | lighttpd | lighttpd | ≤ 1.4.27 | Yes |
Application | lighttpd | lighttpd | 1.3.16 | Yes |
Application | lighttpd | lighttpd | 1.4.3 | Yes |
Application | lighttpd | lighttpd | 1.4.4 | Yes |
Application | lighttpd | lighttpd | 1.4.5 | Yes |
Application | lighttpd | lighttpd | 1.4.6 | Yes |
Application | lighttpd | lighttpd | 1.4.7 | Yes |
Application | lighttpd | lighttpd | 1.4.8 | Yes |
Application | lighttpd | lighttpd | 1.4.9 | Yes |
Application | lighttpd | lighttpd | 1.4.10 | Yes |
Application | lighttpd | lighttpd | 1.4.11 | Yes |
Application | lighttpd | lighttpd | 1.4.12 | Yes |
Application | lighttpd | lighttpd | 1.4.13 | Yes |
Application | lighttpd | lighttpd | 1.4.15 | Yes |
Application | lighttpd | lighttpd | 1.4.16 | Yes |
Application | lighttpd | lighttpd | 1.4.18 | Yes |
Application | lighttpd | lighttpd | 1.4.19 | Yes |
Application | lighttpd | lighttpd | 1.4.20 | Yes |
Application | lighttpd | lighttpd | 1.4.21 | Yes |
Application | lighttpd | lighttpd | 1.4.22 | Yes |
Application | lighttpd | lighttpd | 1.4.23 | Yes |
Application | lighttpd | lighttpd | 1.4.24 | Yes |
Application | lighttpd | lighttpd | 1.4.25 | Yes |
Application | lighttpd | lighttpd | 1.4.26 | Yes |
Operating System | debian | debian_linux | * | No |