LightTPD Critical Vulnerability - 20240712004¶
Overview¶
The WA SOC has been made aware of a use-after-free vulnerability in lighttpd that allows a remote, unauthenticated attacker to trigger lighttpd to read from invalid pointers in memory. The attacker can use crafted HTTP Requests to crash the web server and/or leak memory in order to access sensitive data. This vulnerability was fixed in 2018 by the lighttpd project. However, a number of implementations of lighttpd remain vulnerable due to a failure to apply the security updates provided by lighttpd.
What is vulnerable?¶
Products Affected | CVE | CVSS | Severity |
---|---|---|---|
LightTPD versions 1.4.50 and earlier | CVE-2018-25103 | 5.3 | Medium |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):