Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00011.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00055.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-10/msg00059.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-11/msg00024.html | Mailing List Third Party Advisory |
http://secunia.com/advisories/55197 | Third Party Advisory |
http://svn.apache.org/viewvc?view=revision&revision=1527362 | Patch Vendor Advisory |
http://www.debian.org/security/2013/dsa-2778 | Third Party Advisory |
http://www.mail-archive.com/dev%40httpd.apache.org/msg58077.html | |
http://www.securityfocus.com/bid/62939 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2013-10-17 23:55
Updated : 2023-11-07 02:16
NVD link : CVE-2013-4365
Mitre link : CVE-2013-4365
CVE.ORG link : CVE-2013-4365
JSON object : View
Products Affected
apache
- http_server
- mod_fcgid
opensuse
- opensuse
suse
- cloud
- linux_enterprise_software_development_kit
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write