Integer Overflow Vulnerability in FastCGI Library for Perl
CVE-2025-40907
Key Information:
Badges
What is CVE-2025-40907?
The FastCGI library versions 0.44 through 0.82 for Perl are vulnerable to an integer overflow that can result in a heap-based buffer overflow. This vulnerability is triggered by improperly handled nameLen or valueLen parameters in data sent to the IPC socket, specifically during the ReadParams function in the fcgiapp.c file. Exploiting this flaw may allow attackers to execute arbitrary code or crash affected services. It is crucial for organizations using these FastCGI versions to apply the necessary patches to safeguard their systems.
Affected Version(s)
FCGI 0.44 <= 0.82
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved