nginx HTTP Request Multiple Vulnerabilities

high Nessus Plugin ID 41608

Synopsis

The web server on the remote host is affected by multiple vulnerabilities.

Description

The remote web server is running nginx, a lightweight, high performance web server / reverse proxy and email (IMAP/POP3) proxy.

According to its Server response header, the installed version of nginx is affected by multiple vulnerabilities : - A remote buffer overflow attack related to its parsing of complex URIs.

- A remote denial of service attack related to its parsing of HTTP request headers.

Solution

Upgrade to version 0.8.15, 0.7.62, 0.6.39, 0.5.38, or later.

See Also

http://nginx.net/CHANGES

http://nginx.org/en/CHANGES-0.7

http://nginx.org/en/CHANGES-0.6

http://nginx.org/en/CHANGES-0.5

http://sysoev.ru/nginx/patch.180065.txt

https://seclists.org/fulldisclosure/2009/Oct/306

Plugin Details

Severity: High

ID: 41608

File Name: nginx_http_request_buffer_overflow.nasl

Version: 1.31

Type: combined

Agent: unix

Family: Web Servers

Published: 9/24/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2009-2629

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nginx:nginx

Required KB Items: installed_sw/nginx

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/14/2009

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2009-2629, CVE-2009-3896

BID: 36384, 36839

CWE: 119

CERT: 180065