Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-0240

Опубликовано: 27 мая 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.2

Описание

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

РелизСтатусПримечание
devel

released

3.5-1
esm-infra-legacy/trusty

not-affected

3.4-4ubuntu2.1.14.04.1
lucid

ignored

end of life
precise

released

3.3-4ubuntu0.1
saucy

released

3.4-4ubuntu2.1.13.10.1
trusty

released

3.4-4ubuntu2.1.14.04.1
trusty/esm

not-affected

3.4-4ubuntu2.1.14.04.1
upstream

released

3.5-1

Показывать по

EPSS

Процентиль: 49%
0.00257
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

nvd
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

debian
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ...

github
больше 3 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

oracle-oval
около 11 лет назад

ELSA-2014-1091: mod_wsgi security update (IMPORTANT)

EPSS

Процентиль: 49%
0.00257
Низкий

6.2 Medium

CVSS2