Vulnerability Description
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Modwsgi | Mod Wsgi | <= 4.2.4 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0513.html
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html
- http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.htmlPatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:253
- http://www.openwall.com/lists/oss-security/2014/06/19/7
- http://www.openwall.com/lists/oss-security/2014/11/04/8
- http://www.securityfocus.com/bid/68111
- http://www.ubuntu.com/usn/USN-2431-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1111034
- https://security.gentoo.org/glsa/201612-49
- http://advisories.mageia.org/MGASA-2014-0513.html
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html
- http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.htmlPatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:253
- http://www.openwall.com/lists/oss-security/2014/06/19/7
FAQ
What is CVE-2014-8583?
CVE-2014-8583 is a vulnerability with a CVSS score of 6.9 (MEDIUM). mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified...
How severe is CVE-2014-8583?
CVE-2014-8583 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8583?
Check the references section above for vendor advisories and patch information. Affected products include: Modwsgi Mod Wsgi.