CVE-2010-3872

A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html
http://osvdb.org/69275
http://secunia.com/advisories/42288 Vendor Advisory
http://secunia.com/advisories/42302 Vendor Advisory
http://secunia.com/advisories/42815
http://www.debian.org/security/2010/dsa-2140
http://www.gossamer-threads.com/lists/apache/announce/391406
http://www.securityfocus.com/bid/44900
http://www.vupen.com/english/advisories/2010/2997 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2998 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0031
https://access.redhat.com/security/cve/CVE-2010-3872
https://bugzilla.redhat.com/show_bug.cgi?id=2248172
https://exchange.xforce.ibmcloud.com/vulnerabilities/63303
https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2
https://issues.apache.org/bugzilla/show_bug.cgi?id=49406 Patch
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html
http://osvdb.org/69275
http://secunia.com/advisories/42288 Vendor Advisory
http://secunia.com/advisories/42302 Vendor Advisory
http://secunia.com/advisories/42815
http://www.debian.org/security/2010/dsa-2140
http://www.gossamer-threads.com/lists/apache/announce/391406
http://www.securityfocus.com/bid/44900
http://www.vupen.com/english/advisories/2010/2997 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2998 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0031
https://access.redhat.com/security/cve/CVE-2010-3872
https://bugzilla.redhat.com/show_bug.cgi?id=2248172
https://exchange.xforce.ibmcloud.com/vulnerabilities/63303
https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2
https://issues.apache.org/bugzilla/show_bug.cgi?id=49406 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:mod_fcgid:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:mod_fcgid:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:mod_fcgid:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:mod_fcgid:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:mod_fcgid:2.3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.html -
References () http://osvdb.org/69275 - () http://osvdb.org/69275 -
References () http://secunia.com/advisories/42288 - Vendor Advisory () http://secunia.com/advisories/42288 - Vendor Advisory
References () http://secunia.com/advisories/42302 - Vendor Advisory () http://secunia.com/advisories/42302 - Vendor Advisory
References () http://secunia.com/advisories/42815 - () http://secunia.com/advisories/42815 -
References () http://www.debian.org/security/2010/dsa-2140 - () http://www.debian.org/security/2010/dsa-2140 -
References () http://www.gossamer-threads.com/lists/apache/announce/391406 - () http://www.gossamer-threads.com/lists/apache/announce/391406 -
References () http://www.securityfocus.com/bid/44900 - () http://www.securityfocus.com/bid/44900 -
References () http://www.vupen.com/english/advisories/2010/2997 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2997 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2998 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2998 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0031 - () http://www.vupen.com/english/advisories/2011/0031 -
References () https://access.redhat.com/security/cve/CVE-2010-3872 - () https://access.redhat.com/security/cve/CVE-2010-3872 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=2248172 - () https://bugzilla.redhat.com/show_bug.cgi?id=2248172 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/63303 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/63303 -
References () https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2 - () https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2 -
References () https://issues.apache.org/bugzilla/show_bug.cgi?id=49406 - Patch () https://issues.apache.org/bugzilla/show_bug.cgi?id=49406 - Patch

Information

Published : 2010-11-22 12:54

Updated : 2025-04-11 00:51


NVD link : CVE-2010-3872

Mitre link : CVE-2010-3872

CVE.ORG link : CVE-2010-3872


JSON object : View

Products Affected

apache

  • mod_fcgid
CWE
CWE-121

Stack-based Buffer Overflow

CWE-189

Numeric Errors