TROYANOSYVIRUS
Volver a CVEs

CVE-2019-0211

HIGHCISA KEV
7.8

Descripcion

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

Detalles CVE

Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/8/2019
Ultima modificacion10/27/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorApache
ProductoHTTP Server
Nombre vulnerabilidadApache HTTP Server Privilege Escalation Vulnerability
Fecha inclusion KEV2021-11-03
Fecha limite remediacion2022-05-03
Uso en ransomwareUnknown

Productos afectados

apache:http_servercanonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoranetapp:oncommand_unified_manageropensuse:leaporacle:communications_session_report_manageroracle:communications_session_route_manageroracle:enterprise_manager_ops_centeroracle:http_serveroracle:instantis_enterprisetrackoracle:retail_xstore_point_of_serviceredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_update_services_for_sap_solutionsredhat:jboss_core_servicesredhat:openshift_container_platformredhat:openshift_container_platform_for_powerredhat:software_collections

Debilidades (CWE)

CWE-416CWE-416

Referencias

https://usn.ubuntu.com/3937-1/(security@apache.org)
http://www.apache.org/dist/httpd/CHANGES_2.4.39(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/04/02/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/07/26/7(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/107666(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHBA-2019:0959(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0746(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0980(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1296(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1297(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1543(af854a3a-2127-422b-91ae-364da2661108)
https://httpd.apache.org/security/vulnerabilities_24.html(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Apr/16(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Apr/5(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201904-20(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190423-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K32957101(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3937-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4422(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46676/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.