Amazon Linux AMI : mod24_wsgi (ALAS-2014-375)

Medium Nessus Plugin ID 78318

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.

mod_wsgi allows you to host Python applications on the Apache HTTP Server. It was found that a remote attacker could leak portions of a mod_wsgi application's memory via the Content-Type header.

Solution

Run 'yum update mod24_wsgi' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2014-375.html

Plugin Details

Severity: Medium

ID: 78318

File Name: ala_ALAS-2014-375.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2014/10/12

Updated: 2018/04/18

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:mod24_wsgi, p-cpe:/a:amazon:linux:mod24_wsgi-debuginfo, p-cpe:/a:amazon:linux:mod24_wsgi-py27, cpe:/o:amazon:linux

Patch Publication Date: 2014/07/09

Reference Information

CVE: CVE-2014-0240, CVE-2014-0242

ALAS: 2014-375