7.8

CVE-2019-0211

Warnung
Exploit

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheHTTP Server Version >= 2.4.17 <= 2.4.38
FedoraprojectFedora Version28
FedoraprojectFedora Version29
FedoraprojectFedora Version30
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionesm
CanonicalUbuntu Linux Version18.10
DebianDebian Linux Version9.0
OpensuseLeap Version15.0
OpensuseLeap Version42.3
NetappOncommand Unified Manager Version- SwPlatform7-mode
RedhatJboss Core Services Version1.0
RedhatSoftware Collections Version1.0
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
RedhatEnterprise Linux Eus Version8.6
RedhatEnterprise Linux Eus Version8.8
RedhatEnterprise Linux For Arm 64 Version8.0_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.1_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.2_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.4_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.6_aarch64
RedhatEnterprise Linux For Arm 64 Eus Version8.8_aarch64
OracleHTTP Server Version12.2.1.3.0

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Apache HTTP Server Privilege Escalation Vulnerability

Schwachstelle

Apache HTTP Server, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute code with the privileges of the parent process (usually root) by manipulating the scoreboard.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 85.73% 0.993
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

https://seclists.org/bugtraq/2019/Apr/5
Third Party Advisory
Mailing List
https://usn.ubuntu.com/3937-1/
Third Party Advisory
https://www.debian.org/security/2019/dsa-4422
Third Party Advisory
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
Third Party Advisory
Broken Link
Mailing List
Release Notes
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
Third Party Advisory
Broken Link
Mailing List
Release Notes
http://www.securityfocus.com/bid/107666
Third Party Advisory
Broken Link
VDB Entry
https://seclists.org/bugtraq/2019/Apr/16
Patch
Third Party Advisory
Mailing List
https://www.exploit-db.com/exploits/46676/
Third Party Advisory
Exploit
VDB Entry