Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0240

Опубликовано: 21 мая 2014
Источник: redhat
CVSS2: 6.9

Описание

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 2python27-mod_wsgiAffected
Red Hat Satellite 5.6mod_wsgiWill not fix
Red Hat Satellite 6mod_wsgiNot affected
Red Hat Satellite Proxy 5.6mod_wsgiNot affected
Red Hat Subscription Asset Managermod_wsgiWill not fix
RHUI for RHEL 6mod_wsgiWill not fix
Red Hat Enterprise Linux 6mod_wsgiFixedRHSA-2014:078825.06.2014
Red Hat Enterprise Linux 7mod_wsgiFixedRHSA-2014:109125.08.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6python27-mod_wsgiFixedRHSA-2014:078925.06.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6python33-mod_wsgiFixedRHSA-2014:078925.06.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-271
https://bugzilla.redhat.com/show_bug.cgi?id=1101863mod_wsgi: possible privilege escalation in setuid() failure scenarios

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

nvd
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

debian
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ...

github
больше 3 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

oracle-oval
около 11 лет назад

ELSA-2014-1091: mod_wsgi security update (IMPORTANT)

6.9 Medium

CVSS2