Popular web server software Apache HTTP had a privilege escalation flaw that could have compromised Unix systems. The serious vulnerability was discovered by Charles Fol, a security engineer at Ambionics.
Fol stated that the flaw was the result of an out-of-bounds array access giving rise to an arbitrary function call. It affected systems running Linux operating systems.
Worth noting
Apache patches the flaw
In an advisory, Apache acknowledged the flaw by Fol and has mentioned that the version 2.4.39 of HTTP Server fixes. “In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected,” read the advisory.
Version 2.4.39 also patched a host of other vulnerabilities that were present in HTTP Server. Users are advised to run this latest version which can be downloaded here.
Publisher