[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-8583Date: (C)2014-12-18   (M)2023-12-22


mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.9
Exploit Score: 3.4
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
BID-68111
GLSA-201612-49
MDVSA-2014:253
USN-2431-1
http://www.openwall.com/lists/oss-security/2014/06/19/7
http://www.openwall.com/lists/oss-security/2014/11/04/8
http://advisories.mageia.org/MGASA-2014-0513.html
http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html
https://bugzilla.redhat.com/show_bug.cgi?id=1111034
openSUSE-SU-2014:1590

CPE    1
cpe:/a:modwsgi:mod_wsgi
CWE    1
CWE-254
OVAL    4
oval:org.secpod.oval:def:1600878
oval:org.secpod.oval:def:702315
oval:org.secpod.oval:def:52354
oval:org.secpod.oval:def:1700022
...

© SecPod Technologies