CVE-2019-0211

Severity

72%

Complexity

39%

Confidentiality

165%

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

CVSS 3.0 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.2. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).

Overview

First reported 5 years ago

2019-04-08 22:29:00

Last updated 5 years ago

2019-06-11 22:29:00

Affected Software

Apache Software Foundation Apache HTTP Server

Fedora 29

29

Fedora 30

30

Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)

14.04

Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)

16.04

Canonical Ubuntu Linux 18.04 LTS Edition

18.04

Canonical Ubuntu Linux 18.10

18.10

Debian Linux 9.0

9.0

openSUSE Leap 15.0

15.0

openSUSE Leap 42.3

42.3

References

openSUSE-SU-2019:1190

Mailing List, Release Notes, Third Party Advisory

openSUSE-SU-2019:1209

Mailing List, Release Notes, Third Party Advisory

openSUSE-SU-2019:1258

Third Party Advisory

http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html

Third Party Advisory, VDB Entry

http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html

Third Party Advisory, VDB Entry

http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html

Exploit, Third Party Advisory, VDB Entry

http://www.apache.org/dist/httpd/CHANGES_2.4.39

Vendor Advisory

[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts

Mailing List, Third Party Advisory

[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2

107666

Third Party Advisory, VDB Entry

RHBA-2019:0959

RHSA-2019:0746

Third Party Advisory

RHSA-2019:0980

RHSA-2019:1296

RHSA-2019:1297

RHSA-2019:1543

https://httpd.apache.org/security/vulnerabilities_24.html

Vendor Advisory

[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?

Mailing List, Vendor Advisory

[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217

Mailing List, Vendor Advisory

[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?

Mailing List, Vendor Advisory

[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?

Mailing List, Vendor Advisory

[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml

[announce] 20200131 Apache Software Foundation Security Report: 2019

[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

FEDORA-2019-a4ed7400f4

FEDORA-2019-119b14075a

Third Party Advisory

FEDORA-2019-cf7695b470

Third Party Advisory

20190407 [slackware-security] httpd (SSA:2019-096-01)

Mailing List, Third Party Advisory

20190403 [SECURITY] [DSA 4422-1] apache2 security update

Mailing List, Third Party Advisory

GLSA-201904-20

Third Party Advisory

https://security.netapp.com/advisory/ntap-20190423-0001/

Third Party Advisory

https://support.f5.com/csp/article/K32957101

Third Party Advisory

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us

USN-3937-1

Third Party Advisory

DSA-4422

Third Party Advisory

46676

Exploit, Third Party Advisory, VDB Entry

N/A

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

https://www.synology.com/security/advisory/Synology_SA_19_14

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.