CVE Vulnerabilities

CVE-2014-0240

Published: May 27, 2014 | Modified: Dec 21, 2017
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.2 MEDIUM
AV:L/AC:H/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

Affected Software

Name Vendor Start Version End Version
Mod_wsgi Modwsgi * 3.4 (including)
Mod_wsgi Modwsgi 1.0 (including) 1.0 (including)
Mod_wsgi Modwsgi 1.1 (including) 1.1 (including)
Mod_wsgi Modwsgi 1.2 (including) 1.2 (including)
Mod_wsgi Modwsgi 1.3 (including) 1.3 (including)
Mod_wsgi Modwsgi 1.4 (including) 1.4 (including)
Mod_wsgi Modwsgi 1.5 (including) 1.5 (including)
Mod_wsgi Modwsgi 1.6 (including) 1.6 (including)
Mod_wsgi Modwsgi 2.0 (including) 2.0 (including)
Mod_wsgi Modwsgi 2.1 (including) 2.1 (including)
Mod_wsgi Modwsgi 2.2 (including) 2.2 (including)
Mod_wsgi Modwsgi 2.3 (including) 2.3 (including)
Mod_wsgi Modwsgi 2.4 (including) 2.4 (including)
Mod_wsgi Modwsgi 2.5 (including) 2.5 (including)
Mod_wsgi Modwsgi 2.6 (including) 2.6 (including)
Mod_wsgi Modwsgi 2.7 (including) 2.7 (including)
Mod_wsgi Modwsgi 2.8 (including) 2.8 (including)
Mod_wsgi Modwsgi 3.0 (including) 3.0 (including)
Mod_wsgi Modwsgi 3.1 (including) 3.1 (including)
Mod_wsgi Modwsgi 3.2 (including) 3.2 (including)
Mod_wsgi Modwsgi 3.3 (including) 3.3 (including)

References