CVE-2019-0211

CVE Published 2019-04-08
Related CWE(s) CWE-416: Use After Free
Related Vendor(s) netapp, fedoraproject, apache, canonical, opensuse, oracle, debian, redhat
Related Product(s) debian_linux, retail_xstore_point_of_service, communications_session_route_manager, enterprise_linux_eus, enterprise_linux_for_arm_64, enterprise_linux_server_tus, http_server, enterprise_linux_for_ibm_z_systems, enterprise_linux_for_ibm_z_systems_eus, ubuntu_linux, openshift_container_platform_for_power, enterprise_linux_for_power_little_endian, openshift_container_platform, enterprise_linux_for_power_little_endian_eus, enterprise_linux, instantis_enterprisetrack, jboss_core_services, enterprise_manager_ops_center, communications_session_report_manager, software_collections, enterprise_linux_for_arm_64_eus, fedora, enterprise_linux_server_aus, leap, enterprise_linux_update_services_for_sap_solutions, oncommand_unified_manager
Exploitation Reported (CISA KEV) 2021-11-03
CVSS 3 Base Score 7.8 (HIGH)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector LOCAL

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

References