First published: Fri Apr 13 2007(Updated: )
suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1743 is considered to have a high severity due to its potential for local users to exploit the vulnerability.
To fix CVE-2007-1743, upgrade to a patched version of Apache HTTP Server beyond 2.2.3 that addresses this vulnerability.
The impact of CVE-2007-1743 includes the possibility for local users to create arbitrary UID/GID owned files if /proc is mounted.
CVE-2007-1743 affects systems running Apache HTTP Server version 2.2.3 that utilize the suexec module.
CVE-2007-1743 is categorized as a local vulnerability, requiring local access for exploitation.