CVE-2011-2766
Published: 23 September 2011
The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers.
Notes
Author | Note |
---|---|
tyhicks | Per Debian, introduced in 0.70 |
Priority
Status
Package | Release | Status |
---|---|---|
libfcgi-perl Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Not vulnerable
|
|
maverick |
Released
(0.71-1+squeeze1build0.10.10.1)
|
|
natty |
Released
(0.71-1+squeeze1build0.11.04.1)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(0.74-1)
|
|
quantal |
Not vulnerable
(0.74-1)
|
|
raring |
Not vulnerable
(0.74-1)
|
|
upstream |
Released
(0.73-2)
|
|
Patches: other: https://rt.cpan.org/Public/Bug/Display.html?id=68380 vendor: http://www.debian.org/security/2011/dsa-2327 upstream: http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits%2Ffcgi2.git;a=commitdiff_plain;h=297693dc8362d25bb25e473899c72508a0f71d2e |