UBUNTU-CVE-2013-1427

Source
https://ubuntu.com/security/CVE-2013-1427
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-1427.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2013-1427
Upstream
Withdrawn
2025-07-18T16:42:49Z
Published
2013-03-21T17:55:00Z
Modified
2025-07-16T08:10:41.200836Z
Severity
  • Ubuntu - low
Summary
[none]
Details

The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.

References

Affected packages

Ubuntu:14.04:LTS / lighttpd

Package

Name
lighttpd
Purl
pkg:deb/ubuntu/lighttpd@1.4.33-1+nmu2ubuntu2?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.33-1+nmu2ubuntu2

Affected versions

1.*
1.4.31-3ubuntu3
1.4.33-1ubuntu1
1.4.33-1+nmu2ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "lighttpd",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        },
        {
            "binary_name": "lighttpd-dev",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        },
        {
            "binary_name": "lighttpd-doc",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        },
        {
            "binary_name": "lighttpd-mod-cml",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        },
        {
            "binary_name": "lighttpd-mod-magnet",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        },
        {
            "binary_name": "lighttpd-mod-mysql-vhost",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        },
        {
            "binary_name": "lighttpd-mod-trigger-b4-dl",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        },
        {
            "binary_name": "lighttpd-mod-webdav",
            "binary_version": "1.4.33-1+nmu2ubuntu2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-1427.json"