Показать сообщение отдельно

  #6  
Старый 18.01.2016, 08:58
.Light.
Guest
Сообщений: n/a
Провел на форуме:
65956

Репутация: 0
По умолчанию

nginx SPDY heap buffer overflow

Vulnerability description

A heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request. The problem affects nginx compiled with the ngx_http_spdy_module module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is used in a configuration file.

This vulnerability affects Web Server.

Discovered by: Scripting (Version_Check.script).

Attack details

Current version is : nginx/1.4.6



Retest alert(s)




Mark this alert as a false positive


The impact of this vulnerability

An attacker can cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution

How to fix this vulnerability

Upgrade nginx to the latest version of apply the patch provided by the vendor.

Classification

CWE CWE-122

CVE CVE-2014-0133

CVSS Base Score: 5.1 - AV:N/AC:H/Au:N/C/I/A/EOC/RL:OF

Access Vector: Network

Access Complexity: High

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: Partial

Availability Impact: Partial

Exploitability: Proof of concept code

Remediation Level: Official fix
 
Ответить с цитированием