First published: Fri Apr 13 2007(Updated: )
Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1741 is classified as a high-severity vulnerability due to the ability for local users to gain elevated privileges.
To fix CVE-2007-1741, upgrade your Apache HTTP Server to a version later than 2.2.3 where this vulnerability has been addressed.
CVE-2007-1741 specifically affects Apache HTTP Server version 2.2.3.
CVE-2007-1741 enables local users to execute arbitrary code through race conditions and symlink attacks.
Local users on systems running the affected version of Apache HTTP Server can be impacted by CVE-2007-1741.