nginx < 1.0.14 / 1.1.17 HTTP Header Response Memory Disclosure

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The web server on the remote host is affected by a memory disclosure
vulnerability.

Description :

The remote web server is running nginx, a lightweight, high
performance web server / reverse proxy and email (IMAP/POP3) proxy.

According to its Server response header, the installed version of
nginx is earlier than 1.0.14 or is 1.1.x before 1.1.17 and is,
therefore, affected by a memory disclosure vulnerability.

An issue related to the parsing of HTTP header responses can allow a
remote attacker to obtain the contents of previously freed memory.

See also :

http://nginx.net/CHANGES
http://nginx.net/CHANGES-1.0
http://trac.nginx.org/nginx/changeset/4535/nginx
http://nginx.org/en/security_advisories.html

Solution :

Upgrade to version 1.0.14 / 1.1.17 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 58414 ()

Bugtraq ID: 52578

CVE ID: CVE-2012-1180