CVE-2014-0242

high

Description

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

References

http://www.securityfocus.com/bid/67534

http://www.openwall.com/lists/oss-security/2014/05/21/1

http://modwsgi.readthedocs.org/en/latest/release-notes/version-3.4.html

http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html

Details

Source: Mitre, NVD

Published: 2019-12-09

Updated: 2019-12-17

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High