Lucene search

K
amazonAmazonALAS-2013-249
HistoryDec 02, 2013 - 8:27 p.m.

Important: nginx

2013-12-0220:27:00
alas.aws.amazon.com
18

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.954 High

EPSS

Percentile

99.3%

Issue Overview:

nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.

Affected Packages:

nginx

Issue Correction:
Run yum update nginx to update your system.

New Packages:

i686:  
    nginx-debuginfo-1.4.3-1.14.amzn1.i686  
    nginx-1.4.3-1.14.amzn1.i686  
  
src:  
    nginx-1.4.3-1.14.amzn1.src  
  
x86_64:  
    nginx-1.4.3-1.14.amzn1.x86_64  
    nginx-debuginfo-1.4.3-1.14.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-4547

Mitre: CVE-2013-4547

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.954 High

EPSS

Percentile

99.3%