First published: Thu Oct 17 2013(Updated: )
Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Mod IMAP | <2.3.9 | |
Apache Http Server | ||
Debian | =6.0 | |
Debian | =7.0 | |
SUSE Cloud | =1.0 | |
SUSE Cloud | =2.0 | |
openSUSE | =11.4 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4365 is classified as a high-severity vulnerability due to its potential for remote exploitation causing a buffer overflow.
To fix CVE-2013-4365, upgrade the mod_fcgid module to version 2.3.9 or later.
CVE-2013-4365 affects versions of the mod_fcgid module prior to 2.3.9 and various Debian and openSUSE distributions.
Exploiting CVE-2013-4365 could allow remote attackers to execute arbitrary code or crash the affected Apache server.
A temporary workaround for CVE-2013-4365 may include disabling the affected mod_fcgid module until an upgrade can be performed.