Vigil@nce - Apache httpd: buffer overflow of mod_proxy_fcgi
November 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow in mod_proxy_fcgi of
Apache httpd, in order to trigger a denial of service, and
possibly to execute code.
– Impacted products: Apache httpd
– Severity: 2/4
– Creation date: 13/11/2014
DESCRIPTION OF THE VULNERABILITY
The mod_proxy_fcgi module can be installed on Apache httpd, in
order to provide the FastCGI support to mod_proxy.
However, if the size of the FastCGI reply is greater than 8kbytes,
an overflow occurs.
An attacker can therefore generate a buffer overflow in
mod_proxy_fcgi of Apache httpd, in order to trigger a denial of
service, and possibly to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Apache-httpd-buffer-overflow-of-mod-proxy-fcgi-15644