{"id":"CVE-2025-23016","details":"FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.","modified":"2026-04-16T04:34:21.005213707Z","published":"2025-01-10T12:15:25.480Z","related":["SUSE-SU-2025:02369-1","SUSE-SU-2025:02372-1","openSUSE-SU-2025:15348-1"],"references":[{"type":"WEB","url":"https://github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5"},{"type":"WEB","url":"https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/04/23/4"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00009.html"},{"type":"REPORT","url":"https://github.com/FastCGI-Archives/fcgi2/issues/67"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/FastCGI-Archives/fcgi2","events":[{"introduced":"0"},{"last_affected":"0079e56d8b6640c354457be42090617431f5c6bc"}],"database_specific":{"versions":[{"introduced":"2.x"},{"last_affected":"2.4.4"}]}},{"type":"GIT","repo":"https://github.com/fastcgi-archives/fcgi2","events":[{"introduced":"0"},{"fixed":"12ae40e58f6b1d8325408ff6765894f09994f5a9"}]}],"versions":["2.1.1","2.2.2","2.2.3","2.4.0","2.4.1","2.4.1.1","2.4.2","2.4.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-23016.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}