mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2937-1 | mod-wsgi security update |
EUVD |
EUVD-2014-0280 | mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. |
Ubuntu USN |
USN-2222-1 | mod_wsgi vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:39.434Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0242
No data.
Status : Modified
Published: 2019-12-09T20:15:09.623
Modified: 2024-11-21T02:01:44.333
Link: CVE-2014-0242
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN