VID |
22523 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its self-reported banner, the Apache web server listening on this port includes a version of the mod_fcgid module earlier than 2.3.6. Such versions reportedly have a stack buffer overflow vulnerability because of an error in the pointer arithmetic used in the 'fcgid_header_bucket_read()' function.
An unauthenticated remote attacker can leverage this with a specially crafted request to overwrite data on the stack, leading to an application crash or possibly even arbitrary code execution subject to the privileges under which the web server operates.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://mail-archives.apache.org/mod_mbox/httpd-announce/201011.mbox/%3CAANLkTi=pWJ2KYDKuSFJDmnKd_xnF+S+_SZFn0esR-BjN@mail.gmail.com%3E https://issues.apache.org/bugzilla/show_bug.cgi?id=49406
* Platforms Affected: Apache HTTP versions prior to 2.3.6 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.3.6 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi -- OR -- As a workaround, ensure that the affected modules are not in use. |
Related URL |
CVE-2010-3872 (CVE) |
Related URL |
44900 (SecurityFocus) |
Related URL |
(ISS) |
|