First published: Fri Nov 08 2013(Updated: )
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lighttpd | 1.4.53-4+deb10u2 1.4.53-4+deb10u3 1.4.59-1+deb11u2 1.4.69-1 | |
Fipsasp Fipscms Light | >=1.4.24<=1.4.33 | |
Debian | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
SUSE Linux | =12.2 | |
SUSE Linux | =12.3 | |
SUSE Linux | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4508 is considered a medium severity vulnerability due to weak SSL ciphers that can lead to session hijacking and sensitive information exposure.
To fix CVE-2013-4508, upgrade lighttpd to version 1.4.34 or later, ensuring that strong SSL ciphers are configured.
Versions of lighttpd prior to 1.4.34, specifically 1.4.24 to 1.4.33, are affected by CVE-2013-4508.
CVE-2013-4508 can allow remote attackers to hijack sessions and capture sensitive information by exploiting weak SSL ciphers.
CVE-2013-4508 affects lighttpd running on various versions of Debian and openSUSE.