|
|
Subscribe / Log in / New account

libapache2-mod-fcgid: code execution

Package(s):libapache2-mod-fcgid CVE #(s):CVE-2013-4365
Created:October 14, 2013 Updated:February 10, 2014
Description: From the Debian advisory:

Robert Matthews discovered that the Apache FCGID module, a FastCGI implementation for Apache HTTP Server, fails to perform adequate boundary checks on user-supplied input. This may allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.

Alerts:
Gentoo 201402-09 mod_fcgid 2014-02-07
SUSE SUSE-SU-2013:1667-1 apache2-mod_fcgid 2013-11-13
openSUSE openSUSE-SU-2013:1664-1 apache2-mod_fcgid 2013-11-13
openSUSE openSUSE-SU-2013:1613-1 apache2-mod_fcgid 2013-10-30
openSUSE openSUSE-SU-2013:1609-1 apache2-mod_fcgid 2013-10-30
Fedora FEDORA-2013-18686 mod_fcgid 2013-10-18
Fedora FEDORA-2013-18638 mod_fcgid 2013-10-18
Mandriva MDVSA-2013:256 apache-mod_fcgid 2013-10-18
Mageia MGASA-2013-0313 apache-mod_fcgid 2013-10-17
Debian DSA-2778-1 libapache2-mod-fcgid 2013-10-11

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds