Skip to content

LightTPD Critical Vulnerability - 20240712004

Overview

The WA SOC has been made aware of a use-after-free vulnerability in lighttpd that allows a remote, unauthenticated attacker to trigger lighttpd to read from invalid pointers in memory. The attacker can use crafted HTTP Requests to crash the web server and/or leak memory in order to access sensitive data. This vulnerability was fixed in 2018 by the lighttpd project. However, a number of implementations of lighttpd remain vulnerable due to a failure to apply the security updates provided by lighttpd.

What is vulnerable?

Products Affected CVE CVSS Severity
LightTPD versions 1.4.50 and earlier CVE-2018-25103 5.3 Medium

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):

Additional References