Debian DLA-2768-1 : uwsgi - LTS security update

high Nessus Plugin ID 153843

Synopsis

The remote Debian host is missing a security-related update.

Description

The remote Debian 9 host has packages installed that are affected by a vulnerability as referenced in the dla-2768 advisory.

- A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). (CVE-2021-36160)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade the uwsgi packages.

For Debian 9 stretch, this problem has been fixed in version 2.0.14+20161117-3+deb9u4.

See Also

https://security-tracker.debian.org/tracker/source-package/uwsgi

https://www.debian.org/lts/security/2021/dla-2768

https://security-tracker.debian.org/tracker/CVE-2021-36160

https://packages.debian.org/source/stretch/uwsgi

Plugin Details

Severity: High

ID: 153843

File Name: debian_DLA-2768.nasl

Version: 1.3

Type: local

Agent: unix

Published: 10/2/2021

Updated: 1/26/2022

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2021-36160

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:uwsgi-plugin-rados, p-cpe:/a:debian:debian_linux:uwsgi-app-integration-plugins, p-cpe:/a:debian:debian_linux:uwsgi-plugin-v8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-glusterfs, p-cpe:/a:debian:debian_linux:uwsgi-src, p-cpe:/a:debian:debian_linux:uwsgi-plugin-router-access, p-cpe:/a:debian:debian_linux:uwsgi-infrastructure-plugins, p-cpe:/a:debian:debian_linux:uwsgi-plugin-curl-cron, p-cpe:/a:debian:debian_linux:uwsgi-plugin-lua5.2, p-cpe:/a:debian:debian_linux:uwsgi-plugin-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-lua5.1, p-cpe:/a:debian:debian_linux:uwsgi-mongodb-plugins, p-cpe:/a:debian:debian_linux:uwsgi-plugin-rack-ruby2.3, p-cpe:/a:debian:debian_linux:uwsgi, p-cpe:/a:debian:debian_linux:uwsgi-extra, p-cpe:/a:debian:debian_linux:uwsgi-plugin-jvm-openjdk-8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-fiber, p-cpe:/a:debian:debian_linux:uwsgi-plugin-gccgo, p-cpe:/a:debian:debian_linux:uwsgi-plugin-geoip, p-cpe:/a:debian:debian_linux:uwsgi-plugins-all, p-cpe:/a:debian:debian_linux:python-uwsgidecorators, p-cpe:/a:debian:debian_linux:uwsgi-plugin-gevent-python, p-cpe:/a:debian:debian_linux:libapache2-mod-uwsgi, p-cpe:/a:debian:debian_linux:uwsgi-plugin-rbthreads, p-cpe:/a:debian:debian_linux:uwsgi-plugin-alarm-xmpp, p-cpe:/a:debian:debian_linux:libapache2-mod-uwsgi-dbg, p-cpe:/a:debian:debian_linux:uwsgi-plugin-mono, p-cpe:/a:debian:debian_linux:uwsgi-plugin-ring-openjdk-8, p-cpe:/a:debian:debian_linux:python3-uwsgidecorators, p-cpe:/a:debian:debian_linux:uwsgi-plugin-greenlet-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-alarm-curl, p-cpe:/a:debian:debian_linux:uwsgi-emperor, p-cpe:/a:debian:debian_linux:uwsgi-plugin-psgi, p-cpe:/a:debian:debian_linux:uwsgi-dbg, p-cpe:/a:debian:debian_linux:libapache2-mod-proxy-uwsgi-dbg, p-cpe:/a:debian:debian_linux:uwsgi-plugin-asyncio-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-servlet-openjdk-8, p-cpe:/a:debian:debian_linux:libapache2-mod-proxy-uwsgi, p-cpe:/a:debian:debian_linux:uwsgi-plugin-sqlite3, p-cpe:/a:debian:debian_linux:uwsgi-plugin-tornado-python, p-cpe:/a:debian:debian_linux:uwsgi-plugin-asyncio-python3, p-cpe:/a:debian:debian_linux:uwsgi-plugin-emperor-pg, p-cpe:/a:debian:debian_linux:uwsgi-plugin-xslt, p-cpe:/a:debian:debian_linux:uwsgi-plugin-jwsgi-openjdk-8, p-cpe:/a:debian:debian_linux:uwsgi-plugin-luajit, cpe:/o:debian:debian_linux:9.0, p-cpe:/a:debian:debian_linux:uwsgi-plugin-ldap, p-cpe:/a:debian:debian_linux:libapache2-mod-ruwsgi, p-cpe:/a:debian:debian_linux:libapache2-mod-ruwsgi-dbg, p-cpe:/a:debian:debian_linux:uwsgi-core, p-cpe:/a:debian:debian_linux:uwsgi-plugin-graylog2, p-cpe:/a:debian:debian_linux:uwsgi-plugin-php, p-cpe:/a:debian:debian_linux:uwsgi-plugin-python3

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/2/2021

Vulnerability Publication Date: 9/16/2021

Reference Information

CVE: CVE-2021-36160

IAVA: 2021-A-0440-S