Release date: 2011-11-17
Updated on: 2011-11-18
Affected Systems:
Igor Sysoev nginx 1.0.9
Igor Sysoev nginx 1.0.8
Igor Sysoev nginx 0.x
Unaffected system:
Igor Sysoev nginx 1.0.10
Description:
--------------------------------------------------------------------------------
Bugtraq id: 50710
Cve id: CVE-2011-4315
Nginx is a high-performance HTTP and reverse proxy server and an IMAP/POP3/SMTP proxy server.
When nginx processes DNS responses, the "ngx_resolver_copy ()" function (ngx_resolver.c) has a boundary condition error. A specially crafted DNS response will cause a heap buffer overflow. To successfully exploit this vulnerability, you must enable the custom DNS parser.
<* Source: Ben Hawkes
Link: http://www.openwall.com/lists/oss-security/2011/11/17/8
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Igor Sysoev
-----------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://nginx.net/