Vulnerability Details CVE-2014-0240
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 30.1%
CVSS Severity
CVSS v2 Score 6.2
Products affected by CVE-2014-0240
-
cpe:2.3:a:modwsgi:mod_wsgi:1.0
-
cpe:2.3:a:modwsgi:mod_wsgi:1.1
-
cpe:2.3:a:modwsgi:mod_wsgi:1.2
-
cpe:2.3:a:modwsgi:mod_wsgi:1.3
-
cpe:2.3:a:modwsgi:mod_wsgi:1.4
-
cpe:2.3:a:modwsgi:mod_wsgi:1.5
-
cpe:2.3:a:modwsgi:mod_wsgi:1.6
-
cpe:2.3:a:modwsgi:mod_wsgi:2.0
-
cpe:2.3:a:modwsgi:mod_wsgi:2.1
-
cpe:2.3:a:modwsgi:mod_wsgi:2.2
-
cpe:2.3:a:modwsgi:mod_wsgi:2.3
-
cpe:2.3:a:modwsgi:mod_wsgi:2.4
-
cpe:2.3:a:modwsgi:mod_wsgi:2.5
-
cpe:2.3:a:modwsgi:mod_wsgi:2.6
-
cpe:2.3:a:modwsgi:mod_wsgi:2.7
-
cpe:2.3:a:modwsgi:mod_wsgi:2.8
-
cpe:2.3:a:modwsgi:mod_wsgi:3.0
-
cpe:2.3:a:modwsgi:mod_wsgi:3.1
-
cpe:2.3:a:modwsgi:mod_wsgi:3.2
-
cpe:2.3:a:modwsgi:mod_wsgi:3.3
-
cpe:2.3:a:modwsgi:mod_wsgi:3.4