CVE-2014-8583

Related Vulnerabilities: CVE-2014-8583  

mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.

The MITRE CVE dictionary describes this issue as:

mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.

Find out more about CVE-2014-8583 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the versions of mod_wsgi as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 6.9
Base Metrics AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 mod_wsgi Will not fix
Red Hat Software Collections 1 for Red Hat Enterprise Linux python27-mod_wsgi Will not fix
Red Hat Software Collections 1 for Red Hat Enterprise Linux python33-mod_wsgi Will not fix
Red Hat Satellite Proxy 5.6 mod_wsgi Will not fix
Red Hat Satellite 6 mod_wsgi Will not fix
Red Hat Satellite 5.6 mod_wsgi Will not fix
Red Hat OpenShift Enterprise 2 python27-mod_wsgi Will not fix
Red Hat Enterprise Linux 7 mod_wsgi Will not fix
Red Hat Enterprise Linux 6 mod_wsgi Will not fix