CVE-2008-1111

mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
http://secunia.com/advisories/29209 Vendor Advisory
http://secunia.com/advisories/29235 Vendor Advisory
http://secunia.com/advisories/29268 Vendor Advisory
http://secunia.com/advisories/29275 Vendor Advisory
http://secunia.com/advisories/29318 Vendor Advisory
http://secunia.com/advisories/29622 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200803-10.xml
http://trac.lighttpd.net/trac/changeset/2107
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106
http://www.debian.org/security/2008/dsa-1513
http://www.securityfocus.com/archive/1/489465/100/0/threaded
http://www.securityfocus.com/bid/28100
http://www.vupen.com/english/advisories/2008/0763 Vendor Advisory
https://bugs.gentoo.org/show_bug.cgi?id=211956
https://exchange.xforce.ibmcloud.com/vulnerabilities/41008
https://issues.rpath.com/browse/RPL-2326
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
http://secunia.com/advisories/29209 Vendor Advisory
http://secunia.com/advisories/29235 Vendor Advisory
http://secunia.com/advisories/29268 Vendor Advisory
http://secunia.com/advisories/29275 Vendor Advisory
http://secunia.com/advisories/29318 Vendor Advisory
http://secunia.com/advisories/29622 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200803-10.xml
http://trac.lighttpd.net/trac/changeset/2107
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106
http://www.debian.org/security/2008/dsa-1513
http://www.securityfocus.com/archive/1/489465/100/0/threaded
http://www.securityfocus.com/bid/28100
http://www.vupen.com/english/advisories/2008/0763 Vendor Advisory
https://bugs.gentoo.org/show_bug.cgi?id=211956
https://exchange.xforce.ibmcloud.com/vulnerabilities/41008
https://issues.rpath.com/browse/RPL-2326
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:lighttpd:lighttpd:1.4.18:*:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html -
References () http://secunia.com/advisories/29209 - Vendor Advisory () http://secunia.com/advisories/29209 - Vendor Advisory
References () http://secunia.com/advisories/29235 - Vendor Advisory () http://secunia.com/advisories/29235 - Vendor Advisory
References () http://secunia.com/advisories/29268 - Vendor Advisory () http://secunia.com/advisories/29268 - Vendor Advisory
References () http://secunia.com/advisories/29275 - Vendor Advisory () http://secunia.com/advisories/29275 - Vendor Advisory
References () http://secunia.com/advisories/29318 - Vendor Advisory () http://secunia.com/advisories/29318 - Vendor Advisory
References () http://secunia.com/advisories/29622 - Vendor Advisory () http://secunia.com/advisories/29622 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200803-10.xml - () http://security.gentoo.org/glsa/glsa-200803-10.xml -
References () http://trac.lighttpd.net/trac/changeset/2107 - () http://trac.lighttpd.net/trac/changeset/2107 -
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106 - () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106 -
References () http://www.debian.org/security/2008/dsa-1513 - () http://www.debian.org/security/2008/dsa-1513 -
References () http://www.securityfocus.com/archive/1/489465/100/0/threaded - () http://www.securityfocus.com/archive/1/489465/100/0/threaded -
References () http://www.securityfocus.com/bid/28100 - () http://www.securityfocus.com/bid/28100 -
References () http://www.vupen.com/english/advisories/2008/0763 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0763 - Vendor Advisory
References () https://bugs.gentoo.org/show_bug.cgi?id=211956 - () https://bugs.gentoo.org/show_bug.cgi?id=211956 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41008 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41008 -
References () https://issues.rpath.com/browse/RPL-2326 - () https://issues.rpath.com/browse/RPL-2326 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html -

Information

Published : 2008-03-04 23:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-1111

Mitre link : CVE-2008-1111

CVE.ORG link : CVE-2008-1111


JSON object : View

Products Affected

lighttpd

  • lighttpd
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor