mod_cgi in Apache 2.0.39 and 2.0.40 allows local users and possibly remote attackers to cause a denial of service (hang and memory consumption) by causing a CGI script to send a large amount of data to stderr, which results in a read/write deadlock between httpd and the CGI script.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Link | Tags |
---|---|
http://securitytracker.com/id?1007823 | patch vdb entry third party advisory broken link |
http://seclists.org/bugtraq/2002/Sep/0253.html | mailing list exploit third party advisory |
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/generators/mod_cgi.c?r1=1.148.2.7&r2=1.148.2.8 | broken link |
http://www.securityfocus.com/bid/8725 | patch vdb entry third party advisory broken link |
http://issues.apache.org/bugzilla/show_bug.cgi?id=10515 | issue tracking |
http://www.iss.net/security_center/static/10200.php | vdb entry patch broken link |
http://www.securityfocus.com/bid/5787 | exploit vdb entry third party advisory broken link |
http://marc.info/?l=apache-httpd-dev&m=103291952019514&w=2 | mailing list |
http://issues.apache.org/bugzilla/show_bug.cgi?id=22030 | issue tracking patch |