6.2 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
7.5 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html
modwsgi.readthedocs.org/en/latest/release-notes/version-3.5.html
rhn.redhat.com/errata/RHSA-2014-0789.html
secunia.com/advisories/59551
secunia.com/advisories/60094
www.openwall.com/lists/oss-security/2014/05/21/1
www.securityfocus.com/bid/67532