CVE-2020-13938

Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows
References
Link Resource
http://httpd.apache.org/security/vulnerabilities_24.html Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2021/06/10/3 Mailing List Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10379 Third Party Advisory
https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E Mailing List Release Notes Vendor Advisory
https://security.netapp.com/advisory/ntap-20210702-0001/ Third Party Advisory
http://httpd.apache.org/security/vulnerabilities_24.html Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2021/06/10/3 Mailing List Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10379 Third Party Advisory
https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E Mailing List Release Notes Vendor Advisory
https://security.netapp.com/advisory/ntap-20210702-0001/ Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_11:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_12:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*
cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:02

Type Values Removed Values Added
References () http://httpd.apache.org/security/vulnerabilities_24.html - Release Notes, Vendor Advisory () http://httpd.apache.org/security/vulnerabilities_24.html - Release Notes, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2021/06/10/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/06/10/3 - Mailing List, Third Party Advisory
References () https://kc.mcafee.com/corporate/index?page=content&id=SB10379 - Third Party Advisory () https://kc.mcafee.com/corporate/index?page=content&id=SB10379 - Third Party Advisory
References () https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E - () https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E -
References () https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E - () https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E -
References () https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E - Mailing List, Release Notes, Vendor Advisory () https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E - Mailing List, Release Notes, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20210702-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210702-0001/ - Third Party Advisory

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30@%3Cannounce.httpd.apache.org%3E', 'name': '[httpd-announce] 20210609 CVE-2020-13938: Improper Handling of Insufficient Privileges', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd@%3Cdev.httpd.apache.org%3E', 'name': '[httpd-dev] 20210610 Re: svn commit: r1890598 - in /httpd/site/trunk/content/security/json: CVE-2019-17567.json CVE-2020-13938.json CVE-2020-13950.json CVE-2020-35452.json CVE-2021-26690.json CVE-2021-26691.json CVE-2021-30641.json CVE-2021-31618.json', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E -
  • () https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E -

Information

Published : 2021-06-10 07:15

Updated : 2024-11-21 05:02


NVD link : CVE-2020-13938

Mitre link : CVE-2020-13938

CVE.ORG link : CVE-2020-13938


JSON object : View

Products Affected

netapp

  • cloud_backup

mcafee

  • epolicy_orchestrator

microsoft

  • windows

apache

  • http_server
CWE
CWE-862

Missing Authorization