CVE-2019-0211
critical-risk
Published 2019-04-08
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
Do I need to act?
!
90.9% chance of exploitation in next 30 days
EPSS score — higher than 9% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
References (103)
Third Party Advisory
http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalat...
Broken Link
http://www.apache.org/dist/httpd/CHANGES_2.4.39
Broken Link
http://www.securityfocus.com/bid/107666
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0959
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0746
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0980
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1297
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1543
Vendor Advisory
https://httpd.apache.org/security/vulnerabilities_24.html
and 83 more references
79
/ 100
critical-risk
Severity
24/34 · High
Exploitability
27/34 · High
Exposure
28/34 · Critical