Apache mod_fcgid Module fcgid_header_bucket_read() Function Remote Stack Buffer Overflow

high Nessus Plugin ID 54607

Synopsis

The remote web server is at risk of a buffer overflow attack.

Description

According to its self-reported banner, the Apache web server listening on this port includes a version of the mod_fcgid module earlier than 2.3.6. As such, it has a stack-based buffer overflow vulnerability because of an error in the pointer arithmetic used in the 'fcgid_header_bucket_read()' function.

An unauthenticated, remote attacker can leverage this with a specially crafted request to overwrite data on the stack, leading to an application crash or possibly even arbitrary code execution subject to the privileges under which the web server operates.

Solution

Update to version 2.3.6 or later.

See Also

https://bz.apache.org/bugzilla/show_bug.cgi?id=49406

http://www.nessus.org/u?012dfc54

Plugin Details

Severity: High

ID: 54607

File Name: mod_fcgid_2_3_6.nasl

Version: 1.11

Type: remote

Family: Web Servers

Published: 5/20/2011

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:apache:mod_fcgid

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 11/6/2010

Vulnerability Publication Date: 11/22/2010

Reference Information

CVE: CVE-2010-3872

BID: 44900