mod_fcgid: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201207-09 / mod_fcgid
||July 09, 2012
||July 09, 2012: 1
All supported architectures
Multiple vulnerabilities have been found in mod_fcgid, allowing
execution of arbitrary code or Denial of Service.
mod_fcgid is a binary-compatible alternative to mod_fastcgi with better
Multiple vulnerabilities have been found in mod_fcgid:
- An error in the "fcgid_header_bucket_read()" function in
fcgid_bucket.c could cause a stack-based buffer overflow
- An error in the "is_spawn_allowed() function in fcgid_spawn_ctl.c
prevents Apache from recognizing the FcgidMaxProcessesPerClass
directive for a virtual host (CVE-2012-1181).
A local attacker could possibly execute arbitrary code with the
privileges of the process or cause a Denial of Service condition.
Furthermore, a remote attacker could send specially crafted HTTP
requests, possibly resulting in a Denial of Service condition.
There is no known workaround at this time.
All mod_fcgid users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apache/mod_fcgid-2.3.7"