Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-23016

Опубликовано: 10 янв. 2025
Источник: debian
EPSS Низкий

Описание

FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libfcgifixed2.4.5-0.1package
libfcgino-dsabookwormpackage
libfcgipostponedbullseyepackage

Примечания

  • https://github.com/FastCGI-Archives/fcgi2/issues/67

  • https://github.com/FastCGI-Archives/fcgi2/pull/74

  • Fixed by: https://github.com/FastCGI-Archives/fcgi2/commit/b0eabcaf4d4f371514891a52115c746815c2ff15 (2.4.5)

EPSS

Процентиль: 6%
0.00028
Низкий

Связанные уязвимости

CVSS3: 9.3
ubuntu
5 месяцев назад

FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

CVSS3: 9.3
nvd
5 месяцев назад

FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

CVSS3: 9.3
msrc
около 2 месяцев назад

Описание отсутствует

CVSS3: 9.3
github
5 месяцев назад

FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

CVSS3: 10
fstec
2 месяца назад

Уязвимость функции ReadParams реализации протокола FastCGI библиотеки fcgi2 (fcgi), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 6%
0.00028
Низкий