Apache mod_fcgid Module < 2.3.9 fcgid_header_bucket_read() Function Heap-Based Buffer Overflow

medium Nessus Plugin ID 70682

Synopsis

The remote web server is affected by a buffer overflow vulnerability.

Description

According to its self-reported banner, the Apache web server listening on this port includes a version of the mod_fcgid module earlier than 2.3.9. That reportedly has a heap-based buffer overflow vulnerability because of an error in the pointer arithmetic used in the 'fcgid_header_bucket_read()' function.

Solution

Update to version 2.3.9 or later.

See Also

https://www.mail-archive.com/[email protected]/msg58077.html

http://www.nessus.org/u?08112f11

Plugin Details

Severity: Medium

ID: 70682

File Name: mod_fcgid_2_3_9.nasl

Version: 1.6

Type: remote

Family: Web Servers

Published: 10/29/2013

Updated: 11/27/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2013-4365

Vulnerability Information

CPE: cpe:/a:apache:mod_fcgid

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2013

Vulnerability Publication Date: 9/29/2013

Reference Information

CVE: CVE-2013-4365

BID: 62939