Ubuntu 12.04 LTS / 13.10 / 14.04 : mod-wsgi vulnerabilities (USN-2222-1)

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Róbert Kisteleki discovered mod_wsgi incorrectly checked setuid
return values. A malicious application could use this issue to cause a
local privilege escalation when using daemon mode. (CVE-2014-0240)

Buck Golemon discovered that mod_wsgi used memory that had been freed.
A remote attacker could use this issue to read process memory via the
Content-Type response header. This issue only affected Ubuntu 12.04
LTS. (CVE-2014-0242).

Solution :

Update the affected libapache2-mod-wsgi and / or
libapache2-mod-wsgi-py3 packages.

Risk factor :

Medium / CVSS Base Score : 6.2
(CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 74185 ()

Bugtraq ID: 67532
67534

CVE ID: CVE-2014-0240
CVE-2014-0242