Vulnerabilities > CVE-2007-0664 - Unspecified vulnerability in Acme Labs Thttpd
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN acme-labs
nessus
Summary
thttpd before 2.25b-r6 in Gentoo Linux is started from the system root directory (/) by the Gentoo baselayout 1.12.6 package, which allows remote attackers to read arbitrary files.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200701-28.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200701-28 (thttpd: Unauthenticated remote file access) thttpd is vulnerable to an underlying change made to the start-stop-daemon command in the current stable Gentoo baselayout package (version 1.12.6). In the new version, the start-stop-daemon command performs a |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24313 |
published | 2007-02-09 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24313 |
title | GLSA-200701-28 : thttpd: Unauthenticated remote file access |
code |
|
References
- http://bugs.gentoo.org/show_bug.cgi?id=142047
- http://bugs.gentoo.org/show_bug.cgi?id=142047
- http://osvdb.org/31965
- http://osvdb.org/31965
- http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
- http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
- http://seclists.org/fulldisclosure/2023/Nov/13
- http://seclists.org/fulldisclosure/2023/Nov/13
- http://secunia.com/advisories/24018
- http://secunia.com/advisories/24018
- http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml
- http://www.gentoo.org/security/en/glsa/glsa-200701-28.xml
- http://www.securityfocus.com/bid/22349
- http://www.securityfocus.com/bid/22349