Overview
- Description
- The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.6
- Impact score
- 10
- Exploitability score
- 2.7
- Vector string
- AV:L/AC:M/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Vendor comments
- ApacheThis issue did not affect the upstream Apache HTTP Server versions.
- Red HatNot vulnerable. This issue was specific to a Debian patch to Apache HTTP Server.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:debian:apache:1.3.34.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0906B6EF-F2D8-4F36-BE67-CE973FB3C00D" } ], "operator": "OR" } ] } ]