Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for mod24_wsgi (ALAS-2014-375) (multiple CVEs)

Back to Search

Amazon Linux AMI: Security patch for mod24_wsgi (ALAS-2014-375) (multiple CVEs)

Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
05/27/2014
Created
07/25/2018
Added
09/26/2014
Modified
07/04/2017

Description

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

Solution(s)

  • amazon-linux-upgrade-mod24_wsgi
  • amazon-linux-upgrade-mod24_wsgi-debuginfo
  • amazon-linux-upgrade-mod24_wsgi-py27

References

  • amazon-linux-upgrade-mod24_wsgi
  • amazon-linux-upgrade-mod24_wsgi-debuginfo
  • amazon-linux-upgrade-mod24_wsgi-py27

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;