Vulnerability CVE-2019-0217


Published: 2019-04-08

Description:
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

Type:

CWE-362

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Redhat -> Enterprise linux 
Opensuse -> LEAP 
Fedoraproject -> Fedora 
Debian -> Debian linux 
Canonical -> Ubuntu linux 
Apache -> Http server 

 References:
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://www.openwall.com/lists/oss-security/2019/04/02/5
http://www.securityfocus.com/bid/107668
https://bugzilla.redhat.com/show_bug.cgi?id=1695020
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
https://seclists.org/bugtraq/2019/Apr/5
https://security.netapp.com/advisory/ntap-20190423-0001/
https://usn.ubuntu.com/3937-1/
https://usn.ubuntu.com/3937-2/
https://www.debian.org/security/2019/dsa-4422

Copyright 2024, cxsecurity.com

 

Back to Top