Vulnerability CVE-2010-3872


Published: 2010-11-22   Modified: 2012-02-13

Description:
The apr_status_t fcgid_header_bucket_read function in fcgid_bucket.c in Apache mod_fcgid before 2.3.6 does not use bytewise pointer arithmetic in certain circumstances, which has unknown impact and attack vectors related to "untrusted FastCGI applications" and a "stack buffer overwrite."

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Apache -> Mod fcgid 

 References:
https://issues.apache.org/bugzilla/show_bug.cgi?id=49406
http://xforce.iss.net/xforce/xfdb/63303
http://www.vupen.com/english/advisories/2011/0031
http://www.vupen.com/english/advisories/2010/2998
http://www.vupen.com/english/advisories/2010/2997
http://www.securityfocus.com/bid/44900
http://www.gossamer-threads.com/lists/apache/announce/391406
http://www.debian.org/security/2010/dsa-2140
http://secunia.com/advisories/42815
http://secunia.com/advisories/42302
http://secunia.com/advisories/42288
http://osvdb.org/69275
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html

Copyright 2024, cxsecurity.com

 

Back to Top