FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/FastCGI-Archives/fcgi2/issues/67 |
History
Fri, 10 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 10 Jan 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c. | |
Weaknesses | CWE-190 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2025-01-10T00:00:00
Updated: 2025-01-10T15:07:27.272Z
Reserved: 2025-01-10T00:00:00
Link: CVE-2025-23016
Vulnrichment
Updated: 2025-01-10T15:07:23.355Z
NVD
Status : Received
Published: 2025-01-10T12:15:25.480
Modified: 2025-01-10T12:15:25.480
Link: CVE-2025-23016
Redhat
No data.