First published: Fri Jan 10 2025(Updated: )
FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FastCGI | <2.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23016 is classified as a high-severity vulnerability due to its potential to cause a heap-based buffer overflow.
To fix CVE-2025-23016, upgrade to FastCGI fcgi version 2.4.5 or later, which includes patches for this vulnerability.
CVE-2025-23016 affects versions of FastCGI fcgi from 2.0 up to and including 2.4.4.
The impact of CVE-2025-23016 could allow an attacker to exploit the integer overflow and execute arbitrary code through a crafted IPC socket.
Yes, CVE-2025-23016 can be exploited remotely if the FastCGI service is accessible over the network.