CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
EPSS
Percentile
97.3%
Issue Overview:
A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-23017)
Affected Packages:
nginx
Issue Correction:
Run yum update nginx to update your system.
New Packages:
i686:
nginx-mod-stream-1.18.0-1.43.amzn1.i686
nginx-mod-mail-1.18.0-1.43.amzn1.i686
nginx-mod-http-image-filter-1.18.0-1.43.amzn1.i686
nginx-mod-http-perl-1.18.0-1.43.amzn1.i686
nginx-debuginfo-1.18.0-1.43.amzn1.i686
nginx-mod-http-xslt-filter-1.18.0-1.43.amzn1.i686
nginx-1.18.0-1.43.amzn1.i686
nginx-all-modules-1.18.0-1.43.amzn1.i686
nginx-mod-http-geoip-1.18.0-1.43.amzn1.i686
src:
nginx-1.18.0-1.43.amzn1.src
x86_64:
nginx-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-image-filter-1.18.0-1.43.amzn1.x86_64
nginx-debuginfo-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-perl-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-xslt-filter-1.18.0-1.43.amzn1.x86_64
nginx-mod-stream-1.18.0-1.43.amzn1.x86_64
nginx-mod-mail-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-geoip-1.18.0-1.43.amzn1.x86_64
nginx-all-modules-1.18.0-1.43.amzn1.x86_64
Red Hat: CVE-2021-23017
Mitre: CVE-2021-23017
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
EPSS
Percentile
97.3%