CVE-2019-0211

CVE Published 2019-04-08
Related CWE(s) CWE-416: Use After Free
Related Vendor(s) fedoraproject, redhat, oracle, canonical, apache, netapp, opensuse, debian
Related Product(s) http_server, enterprise_linux_for_arm_64, retail_xstore_point_of_service, fedora, leap, communications_session_report_manager, enterprise_manager_ops_center, enterprise_linux, enterprise_linux_for_arm_64_eus, openshift_container_platform_for_power, openshift_container_platform, enterprise_linux_update_services_for_sap_solutions, oncommand_unified_manager, software_collections, enterprise_linux_eus, enterprise_linux_for_power_little_endian_eus, debian_linux, ubuntu_linux, enterprise_linux_server_aus, communications_session_route_manager, jboss_core_services, enterprise_linux_for_ibm_z_systems, enterprise_linux_for_power_little_endian, enterprise_linux_for_ibm_z_systems_eus, instantis_enterprisetrack, enterprise_linux_server_tus
Exploitation Reported (CISA KEV) 2021-11-03
CVSS 3 Base Score 7.8 (HIGH)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector LOCAL

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

References