Vulnerabilities > CVE-2006-4248 - Unspecified vulnerability in Acme Labs Thttpd 2.25B
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
thttpd on Debian GNU/Linux, and possibly other distributions, allows local users to create or touch arbitrary files via a symlink attack on the start_thttpd temporary file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1205.NASL description The original advisory for this issue didn last seen 2020-06-01 modified 2020-06-02 plugin id 22937 published 2006-11-06 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22937 title Debian DSA-1205-2 : thttpd - insecure temporary files NASL family Web Servers NASL id ACME_THTTPD_2_26.NASL description According to its banner, the version of Acme thttpd server running on the remote host is prior to 2.26. It is, therefore, affected by multiple vulnerabilities : - Multiple buffer overflow conditions exist in the htpasswd utility. A local attacker can exploit these, by calling htpasswd and supplying arbitrary commands along with a username to be added to the password file, to bypass required authentication and execute arbitrary programs with elevated privileges. (CVE-2006-1078) - A flaw exists in htpasswd that allows a local attacker to gain privileges via shell metacharacters in a command line argument, which can then be used to execute other commands. (CVE-2006-1079) - An unspecified flaw exists that allows a local attacker to create or touch arbitrary files via a symlink attack on the start_thttpd temporary file. (CVE-2006-4248) Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 97144 published 2017-02-14 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/97144 title Acme thttpd < 2.26 Multiple Vulnerabilities