Description of problem: [Nginx - sHaggY_caT] is vulnerable to a buffer underflow when processing certain HTTP requests. An attacker can use this to execute arbitrary code with the rights of the worker process (www-data on Debian) or possibly perform denial of service attacks by repeatedly crashing worker processes via a specially crafted URL in an HTTP request. (c), Debian security list Original message(on Russian lang, translate with google traslate, if don't understand this languge) in mail list: http://www.lexa.ru/nginx-ru/msg27388.html Version-Release number of selected component (if applicable): bad virsions: 0.1.0-0.8.14 In fedora 11 Nginx version is 0.7.61
*** This bug has been marked as a duplicate of bug 523105 ***