How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote web server is affected by multiple vulnerabilities.
According to its Server response header, the installed version of nginx
is 1.3.x, greater than or equal to 1.3.9, or 1.4.x prior to 1.4.1. It
is, therefore, affected by multiple vulnerabilities :
- A stack-based buffer overflow in 'ngx_http_parse.c' may
allow a remote attacker to execute arbitrary code or
trigger a denial of service condition via a specially
crafted HTTP request. This vulnerability only affects
versions greater than or equal to 1.3.9 and less than
- A memory disclosure vulnerability in 'ngx_http_parse.c'
affects servers that use 'proxy_pass' to untrusted
upstream servers. This issue can be triggered by a
remote attacker via a specially crafted HTTP request.
Failed attempts may result in a denial of service
See also :
Either apply the patch manually or upgrade to nginx 1.4.1 / 1.5.0 or
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.8
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 66672 ()
Bugtraq ID: 5969959824
CVE ID: CVE-2013-2028CVE-2013-2070
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.