Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511 - Vendor Advisory | |
References | () http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2 - Vendor Advisory | |
References | () http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2 - | |
References | () http://osvdb.org/38639 - | |
References | () http://www.securityfocus.com/bid/23438 - | |
References | () http://www.securitytracker.com/id?1017904 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33584 - |
Information
Published : 2007-04-13 16:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-1741
Mitre link : CVE-2007-1741
CVE.ORG link : CVE-2007-1741
JSON object : View
Products Affected
apache
- http_server
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')