CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
94.3%
Róbert Kisteleki discovered mod_wsgi incorrectly checked setuid return
values. A malicious application could use this issue to cause a local
privilege escalation when using daemon mode. (CVE-2014-0240)
Buck Golemon discovered that mod_wsgi used memory that had been freed.
A remote attacker could use this issue to read process memory via the
Content-Type response header. This issue only affected Ubuntu 12.04 LTS.
(CVE-2014-0242)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | libapache2-mod-wsgi | < 3.4-4ubuntu2.1.14.04.1 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapache2-mod-wsgi-py3 | < 3.4-4ubuntu2.1.14.04.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | libapache2-mod-wsgi | < 3.4-4ubuntu2.1.13.10.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | libapache2-mod-wsgi-py3 | < 3.4-4ubuntu2.1.13.10.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | libapache2-mod-wsgi | < 3.3-4ubuntu0.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | libapache2-mod-wsgi-py3 | < 3.3-4ubuntu0.1 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
94.3%