Apache HTTP Server Privilege Escalation Vulnerability Threat Alert

Apache HTTP Server Privilege Escalation Vulnerability Threat Alert

April 12, 2019 | Mina Hao

1 Vulnerability Overview

Recently, Apache released a security advisory, announcing remediation of a privilege escalation vulnerability (CVE-2019-0211). Apache HTTP Server running MPM event, worker or, prefork could allow a less-privileged child thread or process (including scripts executed by an in-process scripting interpreter) to execute arbitrary code with privileges of the parent process (usually root) by manipulating the scoreboard.

Apache HTTP Server is an open-source web server from the Apache Software Foundation. Thanks to its capability of working across platforms, it has been widely used and become one of the most popular web server programs. According to data from NSFOCUS Threat Intelligence center (NTI), the number of Apache-enabled assets publicly available worldwide exceeds 52 million.

Reference link:

https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211

2 Scope of Impact

Affected Versions

  • Apache HTTP Server 2.4.17–2.4.38

Unaffected Versions

  • Apache HTTP Server 2.4.39

Apache points out that this vulnerability affects only applications in the UNIX system. Besides, it does not affect the versions of httpd package shipped with Red Hat Enterprise Linux, but affects the version of httpd package shipped with Red Hat Software Collections. Further impacts of this vulnerability are still under evaluation. For details, visit the following link:

https://access.redhat.com/security/cve/cve-2019-0211


3 Check for the Vulnerability

Apache HTTP Server users can run the following command to check the current version of the application. If it is within the affected scope, the application is potentially at risk and users should upgrade it to the latest version as soon as possible.

4 Recommended Solution

An official release is available to fix this vulnerability. Users are advised to download it from the following link and install it as soon as possible:

https://httpd.apache.org/download.cgi


Appendix

  • Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

  • About NSFOCUS

NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.

For more information about NSFOCUS, please visit:

https://www.nsfocusglobal.com.

NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.