CVE-2008-1531
 
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost.
La función connection_state_machine (connections.c) en lighttpd versión 1.4.19 y anteriores, y versión 1.5.x anterior a 1.5.0, permite a los atacantes remotos generar una denegación de servicio (pérdida de conexión SSL activa) al activar un error SSL, como desconectarse antes que una descarga ha finalizado, lo que hace que todas las conexiones SSL activas se pierdan.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-03-27 CVE Reserved
- 2008-03-27 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/29505 | Third Party Advisory | |
http://secunia.com/advisories/29544 | Third Party Advisory | |
http://secunia.com/advisories/29636 | Third Party Advisory | |
http://secunia.com/advisories/29649 | Third Party Advisory | |
http://secunia.com/advisories/30023 | Third Party Advisory | |
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0132 | Third Party Advisory | |
http://www.osvdb.org/43788 | Broken Link | |
http://www.securityfocus.com/archive/1/490323/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/28489 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2008/1063/references | Third Party Advisory | |
https://bugs.gentoo.org/show_bug.cgi?id=214892 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41545 | Third Party Advisory | |
https://issues.rpath.com/browse/RPL-2407 | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Lighttpd Search vendor "Lighttpd" | Lighttpd Search vendor "Lighttpd" for product "Lighttpd" | <= 1.4.19 Search vendor "Lighttpd" for product "Lighttpd" and version " <= 1.4.19" | - |
Affected
| ||||||
Lighttpd Search vendor "Lighttpd" | Lighttpd Search vendor "Lighttpd" for product "Lighttpd" | >= 1.5 < 1.5.0 Search vendor "Lighttpd" for product "Lighttpd" and version " >= 1.5 < 1.5.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
|