Ubuntu 12.04 LTS / 13.10 / 14.04 : mod-wsgi vulnerabilities (USN-2222-1)

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Róbert Kisteleki discovered mod_wsgi incorrectly checked setuid
return values. A malicious application could use this issue to cause a
local privilege escalation when using daemon mode. (CVE-2014-0240)

Buck Golemon discovered that mod_wsgi used memory that had been freed.
A remote attacker could use this issue to read process memory via the
Content-Type response header. This issue only affected Ubuntu 12.04
LTS. (CVE-2014-0242).

Solution :

Update the affected libapache2-mod-wsgi and / or
libapache2-mod-wsgi-py3 packages.

Risk factor :

Medium / CVSS Base Score : 6.2
CVSS Temporal Score : 5.4
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 74185 ()

Bugtraq ID: 67532

CVE ID: CVE-2014-0240