Lucene search

K
amazonAmazonALAS-2014-308
HistoryMar 24, 2014 - 11:32 p.m.

Important: nginx

2014-03-2423:32:00
alas.aws.amazon.com
17

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.037 Low

EPSS

Percentile

91.8%

Issue Overview:

Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.

Affected Packages:

nginx

Issue Correction:
Run yum update nginx to update your system.

New Packages:

i686:  
    nginx-debuginfo-1.4.7-1.17.amzn1.i686  
    nginx-1.4.7-1.17.amzn1.i686  
  
src:  
    nginx-1.4.7-1.17.amzn1.src  
  
x86_64:  
    nginx-debuginfo-1.4.7-1.17.amzn1.x86_64  
    nginx-1.4.7-1.17.amzn1.x86_64  

Additional References

Red Hat: CVE-2014-0133

Mitre: CVE-2014-0133

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.037 Low

EPSS

Percentile

91.8%