Lucene search

K
freebsdFreeBSDDA4B89AD-B28F-11E3-99CA-F0DEF16C5C1B
HistoryMar 18, 2014 - 12:00 a.m.

nginx-devel -- SPDY heap buffer overflow

2014-03-1800:00:00
vuxml.freebsd.org
24

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.037

Percentile

91.8%

The nginx project reports:

A bug in the experimental SPDY implementation in nginx was found, which
might allow an attacker to cause a heap memory buffer overflow in a
worker process by using a specially crafted request, potentially
resulting in arbitrary code execution (CVE-2014-0133).
The problem affects nginx 1.3.15 - 1.5.11, compiled with the
ngx_http_spdy_module module (which is not compiled by default) and
without --with-debug configure option, if the β€œspdy” option of the
β€œlisten” directive is used in a configuration file.
The problem is fixed in nginx 1.5.12, 1.4.7.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchnginx-devel=Β 1.3.15UNKNOWN
FreeBSDanynoarchnginx-devel<Β 1.5.12UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.037

Percentile

91.8%