Lucene search

K
gentooGentoo FoundationGLSA-201406-20
HistoryJun 22, 2014 - 12:00 a.m.

nginx: Arbitrary code execution

2014-06-2200:00:00
Gentoo Foundation
security.gentoo.org
34

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.037

Percentile

91.8%

Background

nginx is a robust, small, and high performance HTTP and reverse proxy server.

Description

A bug in the SPDY implementation in nginx was found which might cause a heap memory buffer overflow in a worker process by using a specially crafted request. The SPDY implementation is not enabled in default configurations.

Impact

A remote attacker could cause execution of arbitrary code by using a specially crafted request.

Workaround

Disable the spdy module in NGINX_MODULES_HTTP.

Resolution

All nginx users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-servers/nginx-1.4.7"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-servers/nginx<Β 1.4.7UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.037

Percentile

91.8%