{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-mod_fcgid":"2.2-31.29.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"apache2-mod_fcgid","purl":"pkg:rpm/suse/apache2-mod_fcgid&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2-31.29.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for apache2-mod_fcgid fixes the following issues:\n \n* It used to be possible to set an arbitrary $HTTP_PROXY environment variable\n  for request handlers -- like CGI scripts -- by including a specially crafted\n  HTTP header in the request (CVE-2016-1000104). As a result, these server\n  components would potentially direct all their outgoing HTTP traffic through a\n  malicious proxy server. This patch fixes the issue: the updated Apache server\n  ignores such HTTP headers and never sets $HTTP_PROXY for sub-processes\n  (unless a value has been explicitly configured by the administrator in the\n  configuration file). (bsc#988492)\n","id":"SUSE-SU-2016:1820-1","modified":"2016-07-18T14:06:32Z","published":"2016-07-18T14:06:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20161820-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/988492"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-1000104"}],"related":["CVE-2016-1000104"],"summary":"Security update for apache2-mod_fcgid","upstream":["CVE-2016-1000104"]}