TROYANOSYVIRUS
Back to CVEs

CVE-2019-0211

HIGHCISA KEV
7.8

Description

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

CVE Details

CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published4/8/2019
Last Modified10/27/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorApache
ProductHTTP Server
Vulnerability NameApache HTTP Server Privilege Escalation Vulnerability
KEV Date Added2021-11-03
Remediation Due Date2022-05-03
Ransomware UseUnknown

Affected Products

apache:http_servercanonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoranetapp:oncommand_unified_manageropensuse:leaporacle:communications_session_report_manageroracle:communications_session_route_manageroracle:enterprise_manager_ops_centeroracle:http_serveroracle:instantis_enterprisetrackoracle:retail_xstore_point_of_serviceredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_for_arm_64redhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systemsredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_little_endianredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_update_services_for_sap_solutionsredhat:jboss_core_servicesredhat:openshift_container_platformredhat:openshift_container_platform_for_powerredhat:software_collections

Weaknesses (CWE)

CWE-416CWE-416

References

https://usn.ubuntu.com/3937-1/(security@apache.org)
http://www.apache.org/dist/httpd/CHANGES_2.4.39(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/04/02/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/07/26/7(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/107666(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHBA-2019:0959(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0746(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0980(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1296(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1297(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1543(af854a3a-2127-422b-91ae-364da2661108)
https://httpd.apache.org/security/vulnerabilities_24.html(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Apr/16(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Apr/5(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201904-20(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190423-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K32957101(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3937-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4422(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46676/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.