Vulnerability Details : CVE-2013-4559
lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
Exploit prediction scoring system (EPSS) score for CVE-2013-4559
Probability of exploitation activity in the next 30 days: 1.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-4559
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
[email protected] |
CWE ids for CVE-2013-4559
-
Assigned by: [email protected] (Primary)
References for CVE-2013-4559
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html
Mailing List;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=141576815022399&w=2
Issue Tracking;Third Party Advisory
-
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt
Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2013/11/12/4
Mailing List;Third Party Advisory
-
http://jvn.jp/en/jp/JVN37417423/index.html
Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
Third Party Advisory
-
https://www.debian.org/security/2013/dsa-2795
Third Party Advisory
Products affected by CVE-2013-4559
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*