Vulnerability CVE-2014-8583


Published: 2014-12-16

Description:
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Modwsgi -> Mod wsgi 

 References:
http://advisories.mageia.org/MGASA-2014-0513.html
http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html
http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html
http://www.mandriva.com/security/advisories?name=MDVSA-2014:253
http://www.openwall.com/lists/oss-security/2014/06/19/7
http://www.openwall.com/lists/oss-security/2014/11/04/8
http://www.securityfocus.com/bid/68111
http://www.ubuntu.com/usn/USN-2431-1
https://bugzilla.redhat.com/show_bug.cgi?id=1111034
https://security.gentoo.org/glsa/201612-49

Copyright 2024, cxsecurity.com

 

Back to Top