A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.
lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html
lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html
osvdb.org/69275
secunia.com/advisories/42288
secunia.com/advisories/42302
secunia.com/advisories/42815
www.debian.org/security/2010/dsa-2140
www.gossamer-threads.com/lists/apache/announce/391406
www.securityfocus.com/bid/44900
www.vupen.com/english/advisories/2010/2997
www.vupen.com/english/advisories/2010/2998
www.vupen.com/english/advisories/2011/0031
access.redhat.com/security/cve/CVE-2010-3872
bugzilla.redhat.com/show_bug.cgi?id=2248172
exchange.xforce.ibmcloud.com/vulnerabilities/63303
github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2
issues.apache.org/bugzilla/show_bug.cgi?id=49406
lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html