7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
libapache2-mod-fcgid is vulnerable to arbitrary code execution. A heap-based buffer overflow in the fcgid_header_bucket_read
function in fcgid_bucket.c
allows remote attackers to execute arbitrary code on the host OS.
CPE | Name | Operator | Version |
---|---|---|---|
libapache2-mod-fcgid:stretch | eq | 1:2.3.9-1+b1 | |
libapache2-mod-fcgid:stretch | eq | 1:2.3.9-1+b1 |
lists.opensuse.org/opensuse-security-announce/2013-11/msg00011.html
lists.opensuse.org/opensuse-updates/2013-10/msg00055.html
lists.opensuse.org/opensuse-updates/2013-10/msg00059.html
lists.opensuse.org/opensuse-updates/2013-11/msg00024.html
secunia.com/advisories/55197
svn.apache.org/viewvc?view=revision&revision=1527362
www.debian.org/security/2013/dsa-2778
www.mail-archive.com/[email protected]/msg58077.html
www.securityfocus.com/bid/62939
security-tracker.debian.org/tracker/CVE-2013-4365