CVE-2019-0211

7.8 HIGH CISA KEV - Actively Exploited
Published: April 08, 2019 Modified: October 27, 2025

Description

In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
Source: security@apache.org
Broken Link Mailing List Release Notes Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
Source: security@apache.org
Broken Link Mailing List Release Notes Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
Source: security@apache.org
Broken Link Third Party Advisory
http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html
Source: security@apache.org
Exploit Third Party Advisory VDB Entry
http://www.apache.org/dist/httpd/CHANGES_2.4.39
Source: security@apache.org
Broken Link Vendor Advisory
http://www.openwall.com/lists/oss-security/2019/04/02/3
Source: security@apache.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/07/26/7
Source: security@apache.org
Mailing List
http://www.securityfocus.com/bid/107666
Source: security@apache.org
Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2019:0959
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0746
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0980
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1297
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1543
Source: security@apache.org
Third Party Advisory
https://httpd.apache.org/security/vulnerabilities_24.html
Source: security@apache.org
Vendor Advisory
https://seclists.org/bugtraq/2019/Apr/16
Source: security@apache.org
Mailing List Patch Third Party Advisory
https://seclists.org/bugtraq/2019/Apr/5
Source: security@apache.org
Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201904-20
Source: security@apache.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190423-0001/
Source: security@apache.org
Third Party Advisory
https://support.f5.com/csp/article/K32957101
Source: security@apache.org
Third Party Advisory
https://usn.ubuntu.com/3937-1/
Source: security@apache.org
Third Party Advisory
https://www.debian.org/security/2019/dsa-4422
Source: security@apache.org
Mailing List Third Party Advisory
https://www.exploit-db.com/exploits/46676/
Source: security@apache.org
Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpuapr2020.html
Source: security@apache.org
Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: security@apache.org
Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Source: security@apache.org
Patch Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_19_14
Source: security@apache.org
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Mailing List Release Notes Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Mailing List Release Notes Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory
http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://www.apache.org/dist/httpd/CHANGES_2.4.39
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.openwall.com/lists/oss-security/2019/04/02/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/07/26/7
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.securityfocus.com/bid/107666
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2019:0959
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0746
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0980
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1297
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1543
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://httpd.apache.org/security/vulnerabilities_24.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://seclists.org/bugtraq/2019/Apr/16
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
https://seclists.org/bugtraq/2019/Apr/5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201904-20
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190423-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.f5.com/csp/article/K32957101
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3937-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2019/dsa-4422
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://www.exploit-db.com/exploits/46676/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpuapr2020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_19_14
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-0211
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

103 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
89.0%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-05-03

Weaknesses (CWE)

Affected Vendors

redhat canonical debian netapp fedoraproject oracle apache opensuse