CVE-2014-0240

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:modwsgi:mod_wsgi:*:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:1.0:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:1.1:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:1.2:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:1.3:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:1.4:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:1.5:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:1.6:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.0:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.1:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.2:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.3:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.4:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.5:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.6:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.7:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:2.8:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:3.0:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:3.1:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:3.2:*:*:*:*:*:*:*
cpe:2.3:a:modwsgi:mod_wsgi:3.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-05-27 14:55

Updated : 2024-02-28 12:20


NVD link : CVE-2014-0240

Mitre link : CVE-2014-0240

CVE.ORG link : CVE-2014-0240


JSON object : View

Products Affected

modwsgi

  • mod_wsgi
CWE
CWE-264

Permissions, Privileges, and Access Controls