Fedora 19 : nginx-1.4.1-1.fc19 (2013-7560)

High Nessus Plugin ID 66387


The remote Fedora host is missing a security update.


Update to upstream release 1.4.1 which fixes :

- CVE-2013-2028: Stack-based buffer overflow when handling certain chunked transfer encoding requests

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected nginx package.

See Also



Plugin Details

Severity: High

ID: 66387

File Name: fedora_2013-7560.nasl

Version: $Revision: 1.14 $

Type: local

Agent: unix

Published: 2013/05/13

Modified: 2015/10/19

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:nginx, cpe:/o:fedoraproject:fedora:19

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/05/07

Exploitable With


Core Impact

Metasploit (Nginx HTTP Server 1.3.9-1.4.0 Chunked Encoding Stack Buffer Overflow)

Reference Information

CVE: CVE-2013-2028

BID: 59699

FEDORA: 2013-7560