CVE-2013-4559
Summary
| CVE | CVE-2013-4559 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-11-20 14:12:30 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached. |
Risk And Classification
Primary CVSS: v2.0 7.6 from [email protected]
AV:N/AC:H/Au:N/C:C/I:C/A:C
EPSS: 0.095230000 probability, percentile 0.928620000 (date 2026-04-29)
Problem Types: CWE-264 | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
HighAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:H/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 6.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Application | Lighttpd | Lighttpd | All | All | All | All |
| Operating System | Opensuse | Opensuse | 12.2 | All | All | All |
| Operating System | Opensuse | Opensuse | 12.3 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt | af854a3a-2127-422b-91ae-364da2661108 | download.lighttpd.net | Vendor Advisory |
| JVN#37417423: Multiple vulnerabilities in SolarView Compact | af854a3a-2127-422b-91ae-364da2661108 | jvn.jp | Third Party Advisory |
| oss-security - Re: CVE Request: lighttpd multiple issues (setuid/... unchecked return value, FAM: read after free) | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Third Party Advisory |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Third Party Advisory |
| McAfee Security Bulletin - Network Security Manager/Network Security Platform/Network Threat Behavior Analysis update fixes multiple vulnerabilities (CVE-2013-4559, CVE-2015-3200, CVE-2016-2183, CVE-2020-7256, CVE-2020-7258) | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | Third Party Advisory |
| '[security bulletin] HPSBGN03191 rev.1 - HP Remote Device Access: Virtual Customer Access System (vCA' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Third Party Advisory |
| openSUSE-SU-2014:0072-1: moderate: update for lighttpd | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Debian -- Security Information -- DSA-2795-2 lighttpd | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.