Bug 523302 - Nginx remote buffer underflow attack
Summary: Nginx remote buffer underflow attack
Keywords:
Status: CLOSED DUPLICATE of bug 523105
Alias: None
Product: Fedora
Classification: Fedora
Component: nginx
Version: 11
Hardware: All
OS: Linux
low
urgent
Target Milestone: ---
Assignee: Jeremy Hinegardner
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-09-14 20:21 UTC by sHaggY_caT
Modified: 2009-09-14 20:39 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-09-14 20:39:42 UTC


Attachments (Terms of Use)

Description sHaggY_caT 2009-09-14 20:21:46 UTC
Description of problem:

[Nginx - sHaggY_caT] is vulnerable to a buffer underflow when
processing certain HTTP requests.  An attacker can use this to execute
arbitrary code with the rights of the worker process (www-data on Debian)
or possibly perform denial of service attacks by repeatedly crashing
worker processes via a specially crafted URL in an HTTP request. 
(c), Debian security list

Original message(on Russian lang, translate with google traslate, if don't understand this languge) in mail list:

http://www.lexa.ru/nginx-ru/msg27388.html

Version-Release number of selected component (if applicable):

bad virsions: 0.1.0-0.8.14

In fedora 11 Nginx version is 0.7.61

Comment 1 Jeremy Hinegardner 2009-09-14 20:39:42 UTC

*** This bug has been marked as a duplicate of bug 523105 ***


Note You need to log in before you can comment on or make changes to this bug.