Gentoo Linux Security Advisory 201402-9 - A buffer overflow in Apache mod_fcgid might allow remote attackers to execute arbitrary code or cause a Denial of Service condition. Versions less than 2.3.9 are affected.
35695061e8356a815e05b17659d3f0ef2c15bde8d31916f0edb15fc200e0f871
Mandriva Linux Security Advisory 2013-256 - Apache mod_fcgid before version 2.3.9 fails to perform adequate boundary checks on user-supplied input. This may allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
d20d575cf387a12cb1f1fe8d514bb5a5a16afb37a8356c7288310330372f7c28
Debian Linux Security Advisory 2778-1 - Robert Matthews discovered that the Apache FCGID module, a FastCGI implementation for Apache HTTP Server, fails to perform adequate boundary checks on user-supplied input. This may allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
a691935e6b3883f0bb5112b1fc262bde929253995e637c6def6907d4358e59f0