nginx < 1.0.10 DNS Resolver Remote Heap Buffer Overflow

Medium Nessus Network Monitor Plugin ID 6456

Synopsis

The remote web server is affected by a buffer-overflow vulnerability.

Description

The remote host is running a nginx HTTP server.

Versions earlier than 1.0.10 are vulnerable to a remote heap-based buffer-overflow vulnerability due to a failure to properly bounds check user-supplied input to the DNS resolver. The issue occurs specifically when the DNS resolver processes messages more than 255 bytes. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the application. (CVE-2011-4314)

Solution

Upgrade to nginx 1.0.10 or later.

See Also

http://trac.nginx.org/nginx/changeset/4268/nginx

http://www.nginx.org/en/CHANGES

http://www.securityfocus.com/bid/50710

Plugin Details

Severity: Medium

ID: 6456

File Name: 6456.prm

Family: Web Servers

Published: 2012/04/17

Modified: 2016/01/19

Dependencies: 1442

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:igor_sysoev:nginx

Patch Publication Date: 2011/11/09

Vulnerability Publication Date: 2011/11/17

Reference Information

CVE: CVE-2011-4315

BID: 50710

OSVDB: 77184