A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.Referenceshttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050930.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050932.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050976.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00004.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00005.htmlhttp://osvdb.org/69275http://secunia.com/advisories/42288http://secunia.com/advisories/42302http://secunia.com/advisories/42815http://www.debian.org/security/2010/dsa-2140http://www.gossamer-threads.com/lists/apache/announce/391406http://www.securityfocus.com/bid/44900http://www.vupen.com/english/advisories/2010/2997http://www.vupen.com/english/advisories/2010/2998http://www.vupen.com/english/advisories/2011/0031https://access.redhat.com/security/cve/CVE-2010-3872https://bugzilla.redhat.com/show_bug.cgi?id=2248172https://exchange.xforce.ibmcloud.com/vulnerabilities/63303https://github.com/apache/httpd-mod_fcgid/commit/b1afa70840b4ab4e6fbc12ac8798b2f3ccc336b2https://issues.apache.org/bugzilla/show_bug.cgi?id=49406