Rapid7 Vulnerability & Exploit Database

USN-2222-1: mod_wsgi vulnerabilities

Back to Search

USN-2222-1: mod_wsgi vulnerabilities

Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
05/26/2014
Created
07/25/2018
Added
05/28/2014
Modified
07/09/2020

Description

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

Solution(s)

  • ubuntu-upgrade-libapache2-mod-wsgi
  • ubuntu-upgrade-libapache2-mod-wsgi-py3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;