Lucene search

K
hackeroneLmolasH1:4689
HistoryMar 24, 2014 - 9:54 p.m.

Internet Bug Bounty: SPDY memory corruption

2014-03-2421:54:07
lmolas
hackerone.com
46

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

85.4%

A bug in the experimental SPDY implementation in nginx 1.5.10 was found, which might allow an attacker to corrupt worker process memory by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0088).

The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with the ngx_http_spdy_module module (which is not compiled by default), if the β€œspdy” option of the β€œlisten” directive is used in a configuration file.

The problem is fixed in nginx 1.5.11.

Patch for the problem can be found here:

http://nginx.org/download/patch.2014.spdy.txt

Thanks to Lucas Molas, researcher at Programa STIC, FundaciΓ³n Dr. Manuel Sadosky, Buenos Aires, Argentina.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

85.4%