First published: Fri Nov 08 2013(Updated: )
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lighttpd | 1.4.53-4+deb10u2 1.4.53-4+deb10u3 1.4.59-1+deb11u2 1.4.69-1 | |
Lighttpd | >=1.4.24<=1.4.33 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
openSUSE | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.