Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0240

Опубликовано: 27 мая 2014
Источник: debian
EPSS Низкий

Описание

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mod-wsgifixed3.5-1package

Примечания

  • https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4

  • only when running with linux >= 2.6.0 and < 3.1.0

EPSS

Процентиль: 49%
0.00257
Низкий

Связанные уязвимости

ubuntu
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

redhat
больше 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

nvd
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

github
больше 3 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

oracle-oval
около 11 лет назад

ELSA-2014-1091: mod_wsgi security update (IMPORTANT)

EPSS

Процентиль: 49%
0.00257
Низкий