First published: Mon Dec 03 2018(Updated: )
The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 allows local users to cause a denial of service (buffer overflow) or possibly have unspecified other impact by creating a symlink through which the openlitespeed program can be invoked with a long command name (involving ../ characters), which is mishandled in the LshttpdMain::getServerRootFromExecutablePath function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Litespeedtech Openlitespeed | <=1.4.41 | |
Litespeedtech Openlitespeed | =1.5.0-rc1 | |
Litespeedtech Openlitespeed | =1.5.0-rc2 | |
Litespeedtech Openlitespeed | =1.5.0-rc3 | |
Litespeedtech Openlitespeed | =1.5.0-rc4 | |
Litespeedtech Openlitespeed | =1.5.0-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19792 is classified as a denial of service vulnerability that can lead to a buffer overflow.
To fix CVE-2018-19792, upgrade LiteSpeed OpenLiteSpeed to version 1.5.0 RC6 or later.
CVE-2018-19792 affects local users of LiteSpeed OpenLiteSpeed versions prior to 1.5.0 RC6.
No, CVE-2018-19792 can only be exploited by local users with access to the system.
CVE-2018-19792 can cause a denial of service or potentially other unspecified impacts due to a buffer overflow.