Lucene search

K
amazonAmazonALAS-2017-894
HistorySep 13, 2017 - 11:19 p.m.

Low: nginx

2017-09-1323:19:00
alas.aws.amazon.com
20

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.963 High

EPSS

Percentile

99.5%

Issue Overview:

A flaw within the processing of ranged HTTP requests has been discovered in the range filter module of nginx. A remote attacker could possibly exploit this flaw to disclose parts of the cache file header, or, if used in combination with third party modules, disclose potentially sensitive memory by sending specially crafted HTTP requests. (CVE-2017-7529)

Affected Packages:

nginx

Issue Correction:
Run yum update nginx to update your system.

New Packages:

i686:  
    nginx-all-modules-1.12.1-1.32.amzn1.i686  
    nginx-1.12.1-1.32.amzn1.i686  
    nginx-mod-http-geoip-1.12.1-1.32.amzn1.i686  
    nginx-mod-mail-1.12.1-1.32.amzn1.i686  
    nginx-debuginfo-1.12.1-1.32.amzn1.i686  
    nginx-mod-http-xslt-filter-1.12.1-1.32.amzn1.i686  
    nginx-mod-http-perl-1.12.1-1.32.amzn1.i686  
    nginx-mod-stream-1.12.1-1.32.amzn1.i686  
    nginx-mod-http-image-filter-1.12.1-1.32.amzn1.i686  
  
src:  
    nginx-1.12.1-1.32.amzn1.src  
  
x86_64:  
    nginx-all-modules-1.12.1-1.32.amzn1.x86_64  
    nginx-1.12.1-1.32.amzn1.x86_64  
    nginx-mod-http-geoip-1.12.1-1.32.amzn1.x86_64  
    nginx-debuginfo-1.12.1-1.32.amzn1.x86_64  
    nginx-mod-mail-1.12.1-1.32.amzn1.x86_64  
    nginx-mod-stream-1.12.1-1.32.amzn1.x86_64  
    nginx-mod-http-xslt-filter-1.12.1-1.32.amzn1.x86_64  
    nginx-mod-http-image-filter-1.12.1-1.32.amzn1.x86_64  
    nginx-mod-http-perl-1.12.1-1.32.amzn1.x86_64  

Additional References

Red Hat: CVE-2017-7529

Mitre: CVE-2017-7529

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.963 High

EPSS

Percentile

99.5%