Home

Description

FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

PUBLISHED Reserved 2025-01-10 | Published 2025-01-10 | Updated 2025-11-03 | Assigner mitre




CRITICAL: 9.3CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-190 Integer Overflow or Wraparound

Product status

Default status
unknown

2.0.0 (semver)
affected

References

www.synacktiv.com/...25-23016-exploiting-the-fastcgi-library exploit

www.openwall.com/lists/oss-security/2025/04/23/4

lists.debian.org/debian-lts-announce/2025/10/msg00009.html

github.com/FastCGI-Archives/fcgi2/issues/67

github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5

www.synacktiv.com/...25-23016-exploiting-the-fastcgi-library

cve.org (CVE-2025-23016)

nvd.nist.gov (CVE-2025-23016)

Download JSON