nginx < 1.0.10 ngx_resolver_copy Function DNS Response Parsing Buffer Overflow

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The web server on the remote host is affected by a buffer overflow
vulnerability.

Description :

The remote web server is running nginx, a lightweight, high
performance web server / reverse proxy and email (IMAP/POP3) proxy.

According to its Server response header, the installed version of
nginx is earlier than 1.0.10 and is, therefore, affected by a
heap-based buffer overflow vulnerability.

An issue related to DNS response parsing exists in the function
'ngx_resolver_copy' in the file 'ngx_resolver.c' which can allow
remote attackers to cause a denial of service or possibly execute
arbitrary code.

Note that successful exploitation requires this application's custom
DNS resolver to be enabled and that this custom resolver is not
enabled by default.

See also :

http://nginx.net/CHANGES-1.0
http://www.openwall.com/lists/oss-security/2011/11/17/8
http://trac.nginx.org/nginx/changeset/4268/nginx

Solution :

Upgrade to version 1.0.10 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 58413 ()

Bugtraq ID: 50710

CVE ID: CVE-2011-4315