Release date:
Updated on: 2013-04-26
Affected Systems:
Igor Sysoev nginx 1.1.19
Igor Sysoev nginx 1.1.17
Igor Sysoev nginx 1.0.9
Igor Sysoev nginx 1.0.8
Igor Sysoev nginx 1.0.15
Igor Sysoev nginx 1.0.14
Igor Sysoev nginx 1.0.10
Description:
--------------------------------------------------------------------------------
Bugtraq id: 59496
Nginx is an HTTP and reverse proxy server. It is also used as a mail proxy server and compiled by Igor Sysoev.
Nginx has the remote Integer Overflow Vulnerability. When r-> count is less than 0 or greater than 255, Nginx
The ngx_http_close_connection function has an integer overflow error. Remote attackers exploit this vulnerability through malicious http requests and can execute arbitrary code in the application context.
<* Source: Safe3
Link: http://permalink.gmane.org/gmane.comp.security.bugtraq/51750
*>
Suggestion:
--------------------------------------------------------------------------------
Temporary solution:
If you cannot install or upgrade the patch immediately, NSFOCUS recommends that you take the following measures to reduce the threat:
* Verify the r-> count input.
Vendor patch:
Igor Sysoev
-----------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://nginx.org/en/download.html