First published: Sat Nov 20 2010(Updated: )
A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mod_fcgid | <2.3.6 | 2.3.6 |
Apache mod_fcgid | =2.3.1 | |
Apache mod_fcgid | =2.3.2 | |
Apache mod_fcgid | =2.3.4 | |
Apache mod_fcgid | <=2.3.5 | |
Apache mod_fcgid | =2.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3872 has a high severity rating due to its potential to cause application crashes due to a buffer overflow.
To fix CVE-2010-3872, upgrade to mod_fcgid version 2.3.6 or later.
CVE-2010-3872 affects mod_fcgid versions 2.3.1 through 2.3.5.
CVE-2010-3872 is a stack-based buffer overflow vulnerability.
CVE-2010-3872 impacts the mod_fcgid module of the Apache HTTP server.