CVE-2014-0240 — Privilege Dropping / Lowering Errors in Mod-wsgi
Severity
6.2MEDIUMNVD
EPSS
0.2%
top 54.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 27
Latest updateMay 17
Description
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
CVSS vector
AV:L/AC:H/C:C/I:C/A:CExploitability: 1.9 | Impact: 10.0
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2014-0240 mod_wsgi: possible privilege escalation in setuid() failure scenarios [epel-5]↗2014-05-28
Bugzilla
▶
Bugzilla▶
CVE-2014-0240 mod_wsgi: possible privilege escalation in setuid() failure scenarios [fedora-all]↗2014-05-28
Bugzilla▶
CVE-2014-0240 python26-mod_wsgi: mod_wsgi: possible privilege escalation in setuid() failure scenarios [epel-5]↗2014-05-28