{"vuid":"VU#245795","idnumber":"245795","name":"Cherokee Web Server fails to drop privileges after daemon starts","keywords":["Cherokee Web Server","drop privileges"],"overview":"Cherokee fails to drop root privileges after binding to port 80.","clean_desc":"Cherokee is a compact, open-source web server. Cherokee is designed to start as root and drop root privileges after binding to port 80. However, versions of Cherokee prior to 0.2.7 fail to drop root privileges properly. By exploting the vulnerability described in CERT VU#711315 in these versions of Cherokee, attackers may execute arbitrary commands as root.","impact":"Remote attackers may run arbitrary commands as root.","resolution":"Upgrade Upgrade to Cherokee 0.2.7: http://aurora.esi.uem.es/~alo/cherokee/Cherokee-0.2.7.tar.gz","workarounds":"","sysaffected":"","thanks":"Thanks to GOBBLES Security Advisory for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://aurora.esi.uem.es/~alo/?action=cherokee","http://www.securityfocus.com/bid/3771"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-01-02T19:55:11Z","publicdate":"2001-12-29T00:00:00Z","datefirstpublished":"2002-09-24T15:53:41Z","dateupdated":"2002-09-24T15:53:46Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"4","cam_impact":"19","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"8.1225","cam_scorecurrentwidelyknown":"10.26","cam_scorecurrentwidelyknownexploited":"18.81","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.1225,"vulnote":null}