Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3872

Опубликовано: 22 нояб. 2010
Источник: debian
EPSS Низкий

Описание

A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libapache2-mod-fcgidfixed1:2.3.6-1package

EPSS

Процентиль: 76%
0.00943
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 15 лет назад

A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.

CVSS3: 7.5
redhat
больше 15 лет назад

A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.

CVSS3: 7.5
nvd
около 15 лет назад

A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.

CVSS3: 7.5
github
больше 3 лет назад

The fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.6 for the Apache HTTP Server does not use bytewise pointer arithmetic in certain circumstances, which has unspecified impact and attack vectors related to "untrusted FastCGI applications" and a "stack buffer overwrite."

EPSS

Процентиль: 76%
0.00943
Низкий