Scientific Linux Security Update : mod_wsgi on SL6.x i386/srpm/x86_64

Medium Nessus Plugin ID 76246


The remote Scientific Linux host is missing one or more security updates.


It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. (CVE-2014-0240)

Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.

It was discovered that mod_wsgi could leak memory of a hosted web application via the 'Content-Type' header. A remote attacker could possibly use this flaw to disclose limited portions of the web application's memory. (CVE-2014-0242)


Update the affected mod_wsgi and / or mod_wsgi-debuginfo packages.

See Also

Plugin Details

Severity: Medium

ID: 76246

File Name: sl_20140625_mod_wsgi_on_SL6_x.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2014/06/26

Updated: 2018/12/28

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Patch Publication Date: 2014/06/25

Reference Information

CVE: CVE-2014-0240, CVE-2014-0242