Solution
Please Install the Updated Packages.
Insight
Ró bert Kisteleki discovered mod_wsgi incorrectly checked setuid return values. A malicious application could use this issue to cause a local privilege escalation when using daemon mode. (CVE-2014-0240)
Buck Golemon discovered that mod_wsgi used memory that had been freed.
A remote attacker could use this issue to read process memory via the Content-Type response header. This issue only affected Ubuntu 12.04 LTS.
(CVE-2014-0242)
Affected
mod-wsgi on Ubuntu 14.04 LTS ,
Ubuntu 13.10 ,
Ubuntu 12.04 LTS
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-0240, CVE-2014-0242 -
CVSS Base Score: 6.2
AV:L/AC:H/Au:N/C:C/I:C/A:C
Related Vulnerabilities