Computer Security
[EN] securityvulns.ru no-pyccku


nginx buffer overflow
Published:10.07.2013
Source:
SecurityVulns ID:13164
Type:client
Threat Level:
6/10
Description:Buffer overflow on proxy_pass upstream HTTP server response processing. Buffer overflow on chunked response parsing.
Affected:NGINX : nginx 1.4
CVE:CVE-2013-2070 (http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.)
 CVE-2013-2028 (The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2721-1] nginx security update (10.07.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod