Scientific Linux Security Update : mod_wsgi on SL6.x i386/srpm/x86_64

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

It was found that mod_wsgi did not properly drop privileges if the
call to setuid() failed. If mod_wsgi was set up to allow unprivileged
users to run WSGI applications, a local user able to run a WSGI
application could possibly use this flaw to escalate their privileges
on the system. (CVE-2014-0240)

Note: mod_wsgi is not intended to provide privilege separation for
WSGI applications. Systems relying on mod_wsgi to limit or sandbox the
privileges of mod_wsgi applications should migrate to a different
solution with proper privilege separation.

It was discovered that mod_wsgi could leak memory of a hosted web
application via the 'Content-Type' header. A remote attacker could
possibly use this flaw to disclose limited portions of the web
application's memory. (CVE-2014-0242)

See also :

Solution :

Update the affected mod_wsgi and / or mod_wsgi-debuginfo packages.

Risk factor :

Medium / CVSS Base Score : 6.2

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 76246 ()

Bugtraq ID:

CVE ID: CVE-2014-0240

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now