Total vulnerabilities in the database
The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.
Software | From | Fixed in |
---|---|---|
lighttpd / lighttpd | - | 1.4.27.x |
lighttpd / lighttpd | 1.3.16 | 1.3.16.x |
lighttpd / lighttpd | 1.4.3 | 1.4.3.x |
lighttpd / lighttpd | 1.4.4 | 1.4.4.x |
lighttpd / lighttpd | 1.4.5 | 1.4.5.x |
lighttpd / lighttpd | 1.4.6 | 1.4.6.x |
lighttpd / lighttpd | 1.4.7 | 1.4.7.x |
lighttpd / lighttpd | 1.4.8 | 1.4.8.x |
lighttpd / lighttpd | 1.4.9 | 1.4.9.x |
lighttpd / lighttpd | 1.4.10 | 1.4.10.x |
lighttpd / lighttpd | 1.4.11 | 1.4.11.x |
lighttpd / lighttpd | 1.4.12 | 1.4.12.x |
lighttpd / lighttpd | 1.4.13 | 1.4.13.x |
lighttpd / lighttpd | 1.4.15 | 1.4.15.x |
lighttpd / lighttpd | 1.4.16 | 1.4.16.x |
lighttpd / lighttpd | 1.4.18 | 1.4.18.x |
lighttpd / lighttpd | 1.4.19 | 1.4.19.x |
lighttpd / lighttpd | 1.4.20 | 1.4.20.x |
lighttpd / lighttpd | 1.4.21 | 1.4.21.x |
lighttpd / lighttpd | 1.4.22 | 1.4.22.x |
lighttpd / lighttpd | 1.4.23 | 1.4.23.x |
lighttpd / lighttpd | 1.4.24 | 1.4.24.x |
lighttpd / lighttpd | 1.4.25 | 1.4.25.x |
lighttpd / lighttpd | 1.4.26 | 1.4.26.x |