Executive Summary

Titlelibapache2-mod-fcgid security update
NameDSA-2436First vendor Publication2012-03-19
VendorDebianLast vendor Modification2012-03-19
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


It was discovered that the Apache FCGID module, a FastCGI implementation, did not properly enforce the FcgidMaxProcessesPerClass resource limit, rendering this control ineffective and potentially allowing a virtual host to consume excessive resources.

For the stable distribution (squeeze), this problem has been fixed in version 1:2.3.6-1+squeeze1.

For the testing distribution (wheezy), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in version 1:2.3.6-1.1.

We recommend that you upgrade your libapache2-mod-fcgid packages.

Original Source

Url : http://www.debian.org/security/2012/dsa-2436

CWE : Common Weakness Enumeration

CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration


OpenVAS Exploits

2012-08-10Name : Gentoo Security Advisory GLSA 201207-09 (mod_fcgid)
File : nvt/glsa_201207_09.nasl
2012-04-30Name : Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
File : nvt/deb_2436_1.nasl

Nessus® Vulnerability Scanner

2012-07-10Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201207-09.nasl - Type : ACT_GATHER_INFO
2012-03-20Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2436.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
2014-02-17 11:30:56
  • Multiple Updates