First published: Fri Mar 14 2014(Updated: )
Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
lighttpd | <1.4.35 | |
Debian GNU/Linux | =6.0 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
openSUSE | =11.4 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise High Availability | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 | |
Contec SV-CPT-MC310 Firmware | <6.5 | |
Contec SV-CPT-MC310 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2324 is considered a medium severity vulnerability, as it allows remote attackers to read arbitrary files.
To fix CVE-2014-2324, upgrade to lighttpd version 1.4.35 or later.
Versions of lighttpd prior to 1.4.35 are affected by CVE-2014-2324.
CVE-2014-2324 impacts various Linux distributions including Debian and openSUSE that use lighttpd before version 1.4.35.
CVE-2014-2324 exploits directory traversal vulnerabilities in mod_evhost and mod_simple_vhost.